DMF Security Options


In an IMS Security test, the MN must participate in either IMS AKA or HTTP Digest authentication or HTTP Basic and must provide credentials that will be acceptable to the IMS. You can include one of these authentication methods in the DMF with the Security Options settings and then use an EXECUTE_AKA event to calculate challenge and keying material. Special Auto-Fill Fields capture challenge information and insert the calculated response as well as explicitly defined values.

This topic describes the authentication settings that can be used on the client and server sides. If the Network Host is local, the same settings are used for both sides. The topics listed under Related Parameters describe the other DMF components used during IMS Security testing.

IMS AKA

HTTP Digest

HTTP Basic Auth

 

Authentication Type

Use the checkboxes to select the type of authentication that will be supported by the DMF. Only one method can be selected.

^ Back to Top


Algorithm

The algorithm used to calculate authentication credentials for IMS AKA or HTTP Digest.

Options: md5, md5-sess

Default: md5

 

^ Back to Top


Username

Available when Enable HTTP Basic is selected. Enter the Username used for HTTP Basic authentication.

Range: Up to 34 characters, cannot contain ":"

Default: username01

^ Back to Top


Secret Key

The key associated with the MN's IMS private identity. The MN and the HSS both maintain this key and the HSS informs the S-CSCF of an MN's private key during the registration process.

Range: Up to 32 hexadecimal digits, prefixed by "0x," or 34 string characters

Default: 0x00

^ Back to Top


Password

The MN's HTTP Digest password.

Range: Up to 32 hexadecimal digits, prefixed by "0x," or 34 string characters

Default: 0x00

^ Back to Top


Operator Variant

The 128-bit, operator-specific MILENAGE constant (OP) provisioned for the network.

Range: Up to 32 hex characters, excluding "0x."

Default: 0x63BFA50EE6523365FF14C1F45F88737D

^ Back to Top


Use AKA in IPSec

If your test includes Data IPSec, the resulting AKA keying material will also be used for IPSec when this box is checked and IPSec is configured for Pre-Provisioned mode. Use an IPSEC_TUNNEL_n_START event to begin SA establishment after AKA is complete.

^ Back to Top


Digest-URI

The URI of the authenticating server. The combination of URI and realm uniquely identifies the protected space and the database used for authentication. One server could be partitioned to support many realms.

Range: N/A

Default: N/A

^ Back to Top


CNonce

The Client Nonce is transmitted in the client's authentication response and is used by both the client and server for mutual authentication and message integrity protection.

Range: N/A

Default: N/A

^ Back to Top


Nonce Count

The number of times the client has transmitted the same CNonce. The value is formatted as a string and will retain leading zeros. The server uses this value for replay protection and should reject responses with a duplicate Nonce Count.

Range: One of the following:

Default: N/A

^ Back to Top


Fixed RAND

On the server side, you can use this checkbox to define a static RAND that will be sent in every IMS AKA challenge.

Range: Up to 32 hex characters, excluding "0x."

Default: 0x00000000000000000000000000000001

^ Back to Top


Fixed Nonce

On the server side, you can use this checkbox to define a static Nonce that will be sent in every HTTP Digest challenge.

Range: Up to 32 hex characters, excluding "0x."

Default: 0x00000000000000000000000000000001

 

^ Back to Top


Host-URI

The Host URI of the authenticating server. The combination of URI and realm uniquely identifies the protected space and the database used for authentication. One server could be partitioned to support many realms.

Range: N/A

Default: N/A

^ Back to Top