[{"name":"S3-173151","title":"Discussion on secondary authentication","source":"Huawei & Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":33030,"status":"rejected","reservation_date":"2017-11-20 03:02:11","uploaded":"2017-11-20 12:52:25","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173151.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173152","title":"Secondary authentication via NEF","source":"Huawei & Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"discussion","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":33020,"status":"noted","reservation_date":"2017-11-20 03:02:11","uploaded":"2017-11-20 12:52:25","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173152.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173157","title":"ID linkage verification in secondary authentication","source":"Huawei & Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":32280,"status":"not treated","reservation_date":"2017-11-20 03:02:11","uploaded":"2017-11-20 12:52:25","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173157.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173158","title":"DN authorization grant and revocation","source":"Huawei & Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":33410,"status":"not treated","reservation_date":"2017-11-20 03:02:11","uploaded":"2017-11-20 12:52:25","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173158.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173159","title":"Secondary Authentication for multiple PDU sessions","source":"Huawei & Hisilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":34010,"status":"not treated","reservation_date":"2017-11-20 03:02:11","uploaded":"2017-11-20 12:52:25","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173159.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173163","title":"Binding Primary and Secondary authentication","source":"Intel Corporation (UK) Ltd","contact":"Farid Adrangi","contact-id":31273,"tdoctype":"discussion","for":"Discussion","abstract":"This contribution describes an issue with the secondary authentication and proposes possible solutions to fix this issue","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":31580,"status":"not treated","reservation_date":"2017-11-20 07:01:29","uploaded":"2017-11-20 08:48:37","revisionof":"","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173163.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173164","title":"Secure binding of primary and secondary authentication","source":"Intel Corporation (UK) Ltd","contact":"Farid Adrangi","contact-id":31273,"tdoctype":"pCR","for":"Approval","abstract":"Solution to prevent unauthorized access to external Data Network using Key Binding","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":31640,"status":"not treated","reservation_date":"2017-11-20 07:11:59","uploaded":"2017-11-20 08:48:37","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173164.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173165","title":"Secure Data Port for Secondary Authentication","source":"Intel Corporation (UK) Ltd","contact":"Farid Adrangi","contact-id":31273,"tdoctype":"pCR","for":"Approval","abstract":"Solution to prevent unauthorized access to external Data Network using secure data port open","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":31650,"status":"not treated","reservation_date":"2017-11-20 07:17:00","uploaded":"2017-11-20 08:48:37","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173165.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173166","title":"Secondary Re-Authentication","source":"Intel Corporation (UK) Ltd","contact":"Farid Adrangi","contact-id":31273,"tdoctype":"pCR","for":"Approval","abstract":"Specify re-authentication method in the existing Secondary Authentication procedure","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":33420,"status":"not treated","reservation_date":"2017-11-20 07:22:52","uploaded":"2017-11-20 08:48:37","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173166.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173228","title":"Clarification on network slice access authentication and authorization","source":"LG Electronics","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":31570,"status":"not treated","reservation_date":"2017-11-20 09:12:51","uploaded":"2017-11-20 09:22:58","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173228.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173301","title":"Identifying a problem with secondary authentication","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":31630,"status":"not treated","reservation_date":"2017-11-20 12:49:57","uploaded":"2017-11-20 14:55:57","revisionof":"S3-172380","revisedto":"S3-180249","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173301.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173302","title":"pCR to update the secondary authentication procedure to include the authentication\/authorization confirmation between UE and SMF when a key generating EAP method is used","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":31660,"status":"not treated","reservation_date":"2017-11-20 12:49:57","uploaded":"2017-11-20 14:55:57","revisionof":"","revisedto":"S3-180250","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173302.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173303","title":"pCR to update the secondary EAP authentication clause to take into account the roaming scenario","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":33010,"status":"not treated","reservation_date":"2017-11-20 12:49:57","uploaded":"2017-11-20 14:55:57","revisionof":"","revisedto":"S3-180251","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173303.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173341","title":"Resolve ENs on use of Normative language","source":"Nokia","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"pCR","for":"Approval","abstract":"Resolve two ENs","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":31520,"status":"not treated","reservation_date":"2017-11-20 13:33:50","uploaded":"2017-11-20 13:40:53","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173341.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173342","title":"Alignment with SA2 procedure and general cleanup","source":"Nokia","contact":"Nagendra Bykampadi","contact-id":69265,"tdoctype":"pCR","for":"Approval","abstract":"Alignment with SA2 procedure for secondary authorization and general cleanup","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":31510,"status":"not treated","reservation_date":"2017-11-20 13:35:38","uploaded":"2017-11-20 13:40:53","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.4.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173342.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-173401","title":"Comments to S3-173163","source":"China Mobile","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"discussion","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":28,"ainumber":"7.2.9","ainame":"Secondary authentication","tdoc_agenda_sort_order":31590,"status":"not treated","reservation_date":"2017-11-22 12:01:04","uploaded":"2017-11-22 12:02:39","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_89_Reno\/Docs\/S3-173401.zip","group":"S3","meeting":"S3-89","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]