[{"name":"S2-2409574","title":"LS from SA WG3-LI: Reply LS on User Identities and Authentication Architecture","source":"SA WG3-LI","contact":"Tyler Hawbaker","contact-id":81103,"tdoctype":"LS in","for":"Action","abstract":"SA WG3-LI kindly thanks SA WG2 for their LS and provides the following answer to Question 3: Question 3: Regarding Key Issue #1 of TR 23.700-32, in SA WG2 also certain companies question whether the user identity that is using the UE also needs to be known for LI purposes e.g., to comply to regulatory requirements. SA WG3-LI Response: SA WG3-LI's understanding from the various solutions proposed in TR 23.700-32 is that the user identity may not be readily available to the CSP. Based on this understanding, SA WG3-LI's conclusion is that whenever the user identity is generated, known, or detected by the CSP, it shall be made available for LI purposes (e.g. LI targeting and reporting). SA WG3-LI kindly refers SA WG2 delegates to TS 33.126 clause 6.2, in particular R.6.2-10 and R.6.2 - 50 through R.6.2 - 110 regarding user identification as background to this conclusion. However, SA WG3-LI would like to note that this analysis is complicated by the fact that TR 23.700-32 contains a large number of potential solutions addressing several distinct use cases. SA WG3-LI would be happy to reconsider or reconfirm these conclusions as it becomes clear which solutions are being brought forward into normative work. Action: SA WG3-LI kindly asks SA WG2 to take the above response into account when discussing candidate solutions to Key Issue #1.","secretary_remarks":"Revision of S2-2407448 from SA2#164. Noted in parallel session","agenda_item_sort_order":126,"ainumber":"19.8.1","ainame":"Study on User Identities and Authentication Architecture (FS_UIA_ARC)","tdoc_agenda_sort_order":18920,"status":"noted","reservation_date":"2024-09-23 09:35:13","uploaded":"2024-09-23 09:36:47","revisionof":"S2-2407448","revisedto":"","release":"Rel-19","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA WG2","Cc":"SA WG3, SA WG1","lsoriginalls":"S3i240476","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG2_Arch\/TSGS2_165_Hyderabad_2024-10\/Docs\/S2-2409574.zip","group":"S2","meeting":"S2-165","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S2-2410191","title":"Key Issue #1, Key Issue #2, and Key Issue #3 Conclusions.","source":"InterDigital Inc. (Rapporteur)","contact":"Michael Starsinic","contact-id":72107,"tdoctype":"pCR","for":"Approval","abstract":"This paper proposes conclusions for Key Issue #1, Key Issue #2, and Key Issue #3.","secretary_remarks":"Agreed in parallel session. Block approved","agenda_item_sort_order":126,"ainumber":"19.8.1","ainame":"Study on User Identities and Authentication Architecture (FS_UIA_ARC)","tdoc_agenda_sort_order":18930,"status":"approved","reservation_date":"2024-03-10 15:48:33","uploaded":"2024-10-03 19:58:27","revisionof":"","revisedto":"","release":"Rel-19","crspec":"23.700-32","crspecversion":"1.0.0","workitem":[{"winame":"FS_UIA_ARC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG2_Arch\/TSGS2_165_Hyderabad_2024-10\/Docs\/S2-2410191.zip","group":"S2","meeting":"S2-165","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]