4.2.2.2.1 NF discovery authorization based on expected NF profile |
Home → NRF → 19.0.0 |
|  33518-j00 | |
| Test Name | TC_DISC_AUTHORIZATION_ALLOWED_PARAMETER | |
| Threat Reference | TR 33.926 [6], clause H.2.2.1, No Authorization of NF discovery based on Authorization Parameters |
|
| Requirement Name | NF discovery authorization for specific scopes |
|
| Requirement Reference | TS 33.501 [3], clause 13.3.1.3, TS 23.502 [4], clause 4.17.4, and TS 29.510 [5], clause 6.2.3.2.3.1. |
|
| Requirement Description | NRF is expected to be able to ensure that NF Discovery and registration requests are authorized as specified in TS 33.501 [3], clause 5.9.2.1. The NRF checks that the values of the authorization parameters in the NF (Service) Profile of an NF Service Producer allows an NF Service Consumer to discover the NF Service Producer. In the response message, the NRF only returns information of those NF Service Producer instances that the NF Service Consumer is authorized to discover, as specified in the TS 33.501 [3], clause 13.3.1.3. The NRF authorizes the Nnrf_NFDiscovery_Request. Based on the profile of the expected NF/NF service and the type of the NF service consumer, the NRF determines whether the NF service consumer is allowed to discover the expected NF instance(s). If the expected NF instance(s) or NF service instance(s) are deployed in a certain network slice, NRF authorizes the discovery request according to the discovery configuration of the Network Slice, e.g. the expected NF instance(s) are only discoverable by the NF in the same network slice as specified in TS 23.502 [4], clause 4.17.4. Based on operator's policies, a discovery request not including the requester's information necessary to validate the authorization parameters in NF Profiles can be rejected or accepted but with only returning in the discovery response NF Instances whose authorization parameters allow any NF Service Consumer to access their services. The authorization parameters in NF Profile are those used by NRF to determine whether a given NF Instance / NF Service Instance can be discovered by an NF Service Consumer in order to consume its offered services (e.g. "allowedNfTypes", "allowedNfDomains", etc.), as specified in TS 29.510 [5], clause 6.2.3.2.3.1, Note 12. If included, the requester-snssais IE is expected to contain the list of S-NSSAI of the requester NF. The NRF is expected to use this to return only those NF profiles of NF Instances allowing to be discovered from the slice(s) identified by this IE, according to the "allowedNssais" list in the NF Profile and NF Service as specified in TS 29.510 [5], clause 6.2.3.2.3.1. |
|
| Test Purpose | Ensure that the NRF being tested does not authorize a discovery request from an NF service consumer instance that lacks the correct authorization provided in the request, based on the parameters prefixed with "allowed" (e.g., allowedNfTypes, allowedNfDomains, allowedNssais...) provided by the NF service producer profile. |
|
| Pre-Conditions |
|
|
| Execution Steps | For all Test Case specific parameters defined in the table 4.2.2.2.1-1, the tester shall repeat the following execution steps. Table 4.2.2.2.1-1 Test Case Specific Parameter Sets ----------- -------------------------- -------------------------- --------------------- ------------------------------------- Test Case parameter NF1 parameter NF2 allowedList (NF1) requester-type (NF2) A NfType NF1 NfType NF2 allowedNfTypes requester-nf-type B PLMN NF1 PLMN NF2 allowedPlmns requester-plmn-list C FQDN NF1 FQDN NF2 allowedNfDomains requester-nf-instance-fqdn D SNPN NF1 SNPN NF2 allowedSnpns requester-snpn-list E S-NSSAI NF1 S-NSSAI NF2 allowedNssais requester-snssais F S-NSSAI NF1 and PLMN NF1 S-NSSAI NF2 and PLMN NF2 allowedPlmns requester-plmn-specific-snssai-list ----------- -------------------------- -------------------------- --------------------- -------------------------------------
|
|
| Expected Results | If the NRF under test is configured to reject unauthorized requests, the NRF responds with a "403 Forbidden" status code, as specified in clause 5.3.2.2.2 of TS 29.510 [5]. If the NRF under test is configured to accept unauthorised requests, but only returns NF instances whose authorisation is accepted in the discovery response, the discovery response will not contain any information about the NF1. |
|
| Expected Format of Evidence | ||
| PDFs | 6260d8f6477928d83bde765ac5e3354b | |