AUID

Application Unique IDentity

Identifier
Introduced in Rel-6
AUID is a globally unique identifier for applications in 3GPP networks, standardized to enable secure application discovery, registration, and service invocation. It provides a standardized addressing mechanism for applications interacting with network functions, crucial for service layer interoperability and application portability across different operator environments.

Description

The Application Unique IDentity (AUID) is a fundamental identifier defined within the 3GPP service layer architecture, specifically within the framework of the Open Service Access (OSA) and later service capability exposure functions. It serves as a permanent, globally unique name for an application that is independent of the application's physical location, deployment instance, or the specific network node hosting it. The AUID is a critical component for application registration, discovery, and secure service invocation within a 3GPP network environment.

Architecturally, the AUID is managed and utilized by the Service Capability Server (SCS) or Application Server (AS) and the network's service exposure function, historically the OSA Gateway (OSA-GW) or more modern Network Exposure Function (NEF). When an application wishes to register with the network to consume network capabilities (like sending an SMS, querying user location, or initiating a call), it presents its AUID as part of the registration procedure. The network's service layer uses this AUID to uniquely identify the application entity across all subsequent interactions. The AUID is not an address for routing messages; instead, it is a logical name used for identification, authorization, and service logic association. It is typically bound to a physical endpoint address (like an IP address and port) during the application's registration session.

The structure and format of the AUID are defined to ensure global uniqueness. It often follows a hierarchical naming scheme, similar to a URI or a domain-based name, which may include elements identifying the application provider, the application name, and potentially a version identifier. This structured format allows for federated management and avoids collisions. Within the network, the AUID is a key used in policy databases to determine what network services and Application Programming Interfaces (APIs) the application is authorized to access, what quality of service levels it may request, and what charging models apply. Its role is therefore central to the security, management, and commercial aspects of network-as-a-service offerings.

In operation, the AUID is used throughout the application's lifecycle. During initial service agreement establishment between an application provider and a network operator, the AUID is assigned. The application then uses this AUID in all signaling with the network's exposure layer. For example, when the application sends a `sendSms` request via the Parlay X API, the AUID is included in the message header. The network gateway validates that the provided AUID corresponds to an active, authorized application session before processing the request. This mechanism prevents unauthorized applications from masquerading as legitimate ones and forms the basis for accurate service usage logging and charging.

Purpose & Motivation

The AUID was created to solve the fundamental problem of unambiguously identifying and managing third-party applications in a standardized, secure manner within telecom networks. Prior to its standardization, proprietary mechanisms were used by different vendors and operators, which created fragmentation, hindered application portability, and complicated security models. An application written for one operator's network could not easily be deployed on another's without significant rework due to different identification and authentication schemes.

The introduction of the AUID, particularly within the 3GPP Open Service Access (OSA) framework in Release 6, was a cornerstone of the move toward open, programmable networks. It enabled the vision of network capabilities being exposed as reusable, discoverable services. The AUID provides the necessary anchor point for implementing consistent application-level security policies, managing service level agreements (SLAs), and facilitating accurate billing for API consumption. Without a globally unique application identifier, it would be impossible to reliably track which application initiated a network action, leading to security vulnerabilities, billing inaccuracies, and an inability to enforce fair usage policies.

Furthermore, the AUID supports essential operational processes like application lifecycle management (registration, deregistration, updates) and fault management. It allows network operators to blacklist or suspend specific misbehaving applications without affecting others. In essence, the AUID transformed applications from opaque external entities into first-class, identifiable, and manageable subjects within the operator's service domain, which was a prerequisite for the successful commercialization of network APIs and the ecosystem of third-party application developers.

Key Features

  • Globally unique identifier for applications, ensuring no naming conflicts
  • Enables secure application registration and authentication with network service layers
  • Serves as a key for policy enforcement, authorization, and access control to network APIs
  • Facilitates accurate charging and billing by uniquely tagging service requests to their originating application
  • Supports application portability across different operator networks by providing a standardized identification scheme
  • Essential for application lifecycle management, including discovery, activation, and decommissioning

Evolution Across Releases

Rel-6 Initial

Introduced as a core component of the Open Service Access (OSA) / Parlay framework. Defined the AUID as the fundamental identifier for applications (client applications) interacting with the OSA Gateway (OSA-GW). Its primary role was to uniquely identify the application during the Framework registration and authentication process, enabling secure discovery and binding to Service Capability Features (SCFs).

Defining Specifications

SpecificationTitle
TS 24.141 3GPP TS 24.141
TS 24.423 3GPP TS 24.423
TS 24.484 3GPP TS 24.484
TS 24.623 3GPP TS 24.623
TS 24.841 3GPP TS 24.841
TS 32.808 3GPP TR 32.808