[{"name":"S2-2000103","title":"Release PDU sessions due to revocation from AAA server or re-auth failure","source":"NEC","contact":"Toshiyuki Tamura","contact-id":17921,"tdoctype":"CR","for":"Approval","abstract":"Summary of change: This CR proposes to release all associated PDU sessions with a revoked S-NSSAI. This CR also proposes to release all associated PDU sessions with an S-NSSAI that the Re-authentication and Re-authorization procedure fails.","secretary_remarks":"Revised in parallel session to S2-2001044.","agenda_item_sort_order":39,"ainumber":"7.10.2","ainame":"Enhancement of Network Slicing (eNS)","tdoc_agenda_sort_order":19260,"status":"revised","reservation_date":"2019-12-24 05:49:46","uploaded":"2020-01-07 01:06:52","revisionof":"","revisedto":"S2-2001044","release":"Rel-16","crspec":"23.502","crspecversion":"16.3.0","workitem":[{"winame":"eNS"}],"crnumber":1953.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG2_Arch\/TSGS2_136AH_Incheon\/Docs\/S2-2000103.zip","group":"S2","meeting":"S2-ah-35699","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S2-2000122","title":"Re-allowing UE for services after the NSSAA revocation","source":"NEC","contact":"Toshiyuki Tamura","contact-id":17921,"tdoctype":"CR","for":"Approval","abstract":"Summary of change: This CR proposes two ways to revive from the revocation status. AAA server initiated. The AMF behaviour is newly defined in a situation where some of rejected S-NSSAIs will be changed to allowed S-NSSAIs when Network Slice-Specific re-authentication and re-authorization is successful for the rejected S-NSSAIs due to revocation. UE initiated Even some S-NSSAIs are managed in UE as rejected NSSAIs due to revocation, the UE can attempt to request the S-NSSAI after a cause of revocation has been fixed by an upper layer of the UE.","secretary_remarks":"Revised in parallel session to S2-2001045.","agenda_item_sort_order":39,"ainumber":"7.10.2","ainame":"Enhancement of Network Slicing (eNS)","tdoc_agenda_sort_order":19300,"status":"revised","reservation_date":"2019-12-26 03:27:50","uploaded":"2020-01-07 01:06:52","revisionof":"","revisedto":"S2-2001045","release":"Rel-16","crspec":"23.501","crspecversion":"16.3.0","workitem":[{"winame":"eNS"}],"crnumber":2011.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG2_Arch\/TSGS2_136AH_Incheon\/Docs\/S2-2000122.zip","group":"S2","meeting":"S2-ah-35699","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S2-2000382","title":"Clarification on pending NSSAI in Network Slice-Specific Authentication and Authorization","source":"LG Electronics","contact":"Hyunsook Kim","contact-id":42013,"tdoctype":"CR","for":"Approval","abstract":"Summary of change: The handling of S-NSSAIs for which network slice-specific authentication and authorization is pending is clarified and aligned to TS 23.502 and TS 24.501","secretary_remarks":"Revised in parallel session to S2-2001046.","agenda_item_sort_order":39,"ainumber":"7.10.2","ainame":"Enhancement of Network Slicing (eNS)","tdoc_agenda_sort_order":19320,"status":"revised","reservation_date":"2020-01-06 10:33:06","uploaded":"2020-01-07 08:01:00","revisionof":"","revisedto":"S2-2001046","release":"Rel-16","crspec":"23.501","crspecversion":"16.3.0","workitem":[{"winame":"eNS"}],"crnumber":2040.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG2_Arch\/TSGS2_136AH_Incheon\/Docs\/S2-2000382.zip","group":"S2","meeting":"S2-ah-35699","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S2-2001044","title":"Release PDU sessions due to revocation from AAA server or re-auth failure","source":"NEC","contact":"Toshiyuki Tamura","contact-id":17921,"tdoctype":"CR","for":"Approval","abstract":"Summary of change: This CR proposes the following three updates. If the Network Slice-Specific Re-Authentication and Re-Authorization fails and there are PDU session(s) established that are associated with the failed S-NSSAI, the AMF shall initiate the PDU Session Release procedure as specified in clause\u00a04.3.4 to release the PDU sessions with the appropriate cause value. If there are PDU session(s) established that are associated with the revoked S-NSSAI, the AMF shall initiate the PDU Session Release procedure as specified in clause\u00a04.3.4 to release the PDU sessions with the appropriate cause value. PDU Session Release procedures can be triggered by the AMF due to NSSAA failure or NSSAA revocation.","secretary_remarks":"Revision of S2-2000103. Revised in parallel session to S2-2001116.","agenda_item_sort_order":39,"ainumber":"7.10.2","ainame":"Enhancement of Network Slicing (eNS)","tdoc_agenda_sort_order":19270,"status":"revised","reservation_date":"2020-01-14 20:13:05","uploaded":"2020-01-18 01:47:52","revisionof":"S2-2000103","revisedto":"S2-2001116","release":"Rel-16","crspec":"23.502","crspecversion":"16.3.0","workitem":[{"winame":"eNS"}],"crnumber":1953.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG2_Arch\/TSGS2_136AH_Incheon\/Docs\/S2-2001044.zip","group":"S2","meeting":"S2-ah-35699","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S2-2001045","title":"Re-allowing UE for services after the NSSAA revocation","source":"NEC","contact":"Toshiyuki Tamura","contact-id":17921,"tdoctype":"CR","for":"Approval","abstract":"Summary of change: Even some S-NSSAIs are managed in UE as rejected NSSAIs due to revocation, the UE can attempt to request the S-NSSAI. Example, after a cause of revocation has been fixed by an upper layer of the UE.","secretary_remarks":"Revision of S2-2000122. Agreed in parallel session. Block approved","agenda_item_sort_order":39,"ainumber":"7.10.2","ainame":"Enhancement of Network Slicing (eNS)","tdoc_agenda_sort_order":19310,"status":"agreed","reservation_date":"2020-01-14 20:13:06","uploaded":"2020-01-18 01:47:52","revisionof":"S2-2000122","revisedto":"","release":"Rel-16","crspec":"23.501","crspecversion":"16.3.0","workitem":[{"winame":"eNS"}],"crnumber":2011.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200071","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG2_Arch\/TSGS2_136AH_Incheon\/Docs\/S2-2001045.zip","group":"S2","meeting":"S2-ah-35699","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S2-2001046","title":"Clarification on pending NSSAI in Network Slice-Specific Authentication and Authorization","source":"LG Electronics","contact":"Hyunsook Kim","contact-id":42013,"tdoctype":"CR","for":"Approval","abstract":"Summary of change: The handling of S-NSSAIs for which network slice-specific authentication and authorization is pending is clarified and aligned to TS 23.502 and TS 24.501","secretary_remarks":"Revision of S2-2000382. Agreed in parallel session. Block approved","agenda_item_sort_order":39,"ainumber":"7.10.2","ainame":"Enhancement of Network Slicing (eNS)","tdoc_agenda_sort_order":19330,"status":"agreed","reservation_date":"2020-01-14 20:13:07","uploaded":"2020-01-18 01:47:52","revisionof":"S2-2000382","revisedto":"","release":"Rel-16","crspec":"23.501","crspecversion":"16.3.0","workitem":[{"winame":"eNS"}],"crnumber":2040.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200071","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG2_Arch\/TSGS2_136AH_Incheon\/Docs\/S2-2001046.zip","group":"S2","meeting":"S2-ah-35699","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S2-2001116","title":"Release PDU sessions due to revocation from AAA server or re-auth failure","source":"NEC, Ericsson","contact":"Toshiyuki Tamura","contact-id":17921,"tdoctype":"CR","for":"Approval","abstract":"Summary of change: This CR proposes the following three updates. If the Network Slice-Specific Re-Authentication and Re-Authorization fails and there are PDU session(s) established that are associated with the failed S-NSSAI, the AMF shall initiate the PDU Session Release procedure as specified in clause\u00a04.3.4 to release the PDU sessions with the appropriate cause value. If there are PDU session(s) established that are associated with the revoked S-NSSAI, the AMF shall initiate the PDU Session Release procedure as specified in clause\u00a04.3.4 to release the PDU sessions with the appropriate cause value. PDU Session Release procedures can be triggered by the AMF due to NSSAA failure or NSSAA revocation. Relocate the existing trigger condition from step 3d to step 1f in sub clause 4.3.4.2.","secretary_remarks":"Revision of S2-2001044. Revised in parallel session to S2-2001622.","agenda_item_sort_order":39,"ainumber":"7.10.2","ainame":"Enhancement of Network Slicing (eNS)","tdoc_agenda_sort_order":19280,"status":"revised","reservation_date":"2020-01-16 06:02:53","uploaded":"2020-01-18 01:47:54","revisionof":"S2-2001044","revisedto":"S2-2001622","release":"Rel-16","crspec":"23.502","crspecversion":"16.3.0","workitem":[{"winame":"eNS"}],"crnumber":1953.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG2_Arch\/TSGS2_136AH_Incheon\/Docs\/S2-2001116.zip","group":"S2","meeting":"S2-ah-35699","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S2-2001622","title":"Release PDU sessions due to revocation from AAA server or re-auth failure","source":"NEC, Ericsson","contact":"Toshiyuki Tamura","contact-id":17921,"tdoctype":"CR","for":"Approval","abstract":"Summary of change: This CR proposes the following three updates. If the Network Slice-Specific Re-Authentication and Re-Authorization fails and there are PDU session(s) established that are associated with the S-NSSAI for which the NSSAA procedure failed, the AMF shall initiate the PDU Session Release procedure as specified in clause\u00a04.3.4 to release the PDU sessions with the appropriate cause value. If there are PDU session(s) established that are associated with the revoked S-NSSAI, the AMF shall initiate the PDU Session Release procedure as specified in clause\u00a04.3.4 to release the PDU sessions with the appropriate cause value. PDU Session Release procedures can be triggered by the AMF due to NSSAA failure or NSSAA revocation. Relocate the existing trigger condition from step 3d to step 1f in sub clause 4.3.4.2.","secretary_remarks":"Revision of S2-2001116. Agreed in parallel session. Block approved. Revised at S2#137E in S2-2002283 (agreed)","agenda_item_sort_order":39,"ainumber":"7.10.2","ainame":"Enhancement of Network Slicing (eNS)","tdoc_agenda_sort_order":19290,"status":"revised","reservation_date":"2020-01-18 01:20:29","uploaded":"2020-01-18 02:07:52","revisionof":"S2-2001116","revisedto":"S2-2002283","release":"Rel-16","crspec":"23.502","crspecversion":"16.3.0","workitem":[{"winame":"eNS"}],"crnumber":1953.0,"crrevision":3.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/WG2_Arch\/TSGS2_136AH_Incheon\/Docs\/S2-2001622.zip","group":"S2","meeting":"S2-ah-35699","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]