Home / Call Flows / 5g-pdu-session-authentication

5G PDU Session Authentication Procedure Explained

call-flow 5G NR | 5GC | NAS | SMF | AAA

Introduction

In 5G networks, PDU Session Authentication is an optional procedure used to authenticate a User Equipment (UE) before allowing it to establish a PDU session with a specific data network.

While the UE is already authenticated during 5G registration, additional authentication may be required when accessing certain data networks or enterprise services.

This procedure ensures that the UE is authorized to access the requested Data Network (DN).

The procedure is defined by the 3rd Generation Partnership Project in:

  • 3GPP TS 23.502 - 5G System Procedures
  • 3GPP TS 24.501 - NAS Protocol
5G PDU Session Authentication call flow diagram

Why PDU Session Authentication Is Needed

Some services require additional authentication beyond network registration.

Examples include:

  • enterprise private networks
  • operator service platforms
  • secure enterprise applications
  • IoT network access control

In these scenarios, the network performs PDU session-level authentication before granting connectivity.

Network Functions Involved

Several 5G Core network functions participate in this procedure.

UE (User Equipment)

Responds to authentication challenges during the session setup.

gNB

Provides radio access and forwards signaling messages.

AMF (Access and Mobility Management Function)

Acts as the signaling anchor between UE and session management functions.

SMF (Session Management Function)

The SMF manages PDU sessions and coordinates authentication procedures.

AAA Server / DN Authentication Server

In some deployments, an external authentication server performs additional authentication for the data network.

Interfaces Used

Interface Description
NR-UuRadio interface between UE and gNB
N1NAS signaling between UE and AMF
N2Control plane between gNB and AMF
N11Control signaling between AMF and SMF
N4Control interface between SMF and UPF
N3User plane tunnel between gNB and UPF

PDU Session Authentication Call Flow

Below is a simplified signaling sequence for the authentication procedure.

UE           gNB           AMF            SMF         AAA Server
 |            |             |              |              |
 |--PDU Session Establishment Request---->|
 |            |----N2-------------------->|
 |            |             |----N11----->|
 |            |             |              |----Auth Req->|
 |            |             |              |<--Auth Chall-|
 |<--Authentication Request--------------|
 |--Authentication Response------------->|
 |            |             |              |
 |<--PDU Session Establishment Accept----|

After successful authentication, the PDU session establishment continues normally.

Step-by-Step Explanation

Step 1: Session Establishment Request

The UE initiates a PDU Session Establishment Request.

This message includes:

  • PDU Session ID
  • Data Network Name (DNN)
  • Session type (IPv4 / IPv6 / Ethernet)
  • Requested network slice

Important parameters to check

Engineers should verify:

  • PDU session ID
  • DNN
  • S-NSSAI (slice identifier)
  • session type

Step 2: Authentication Trigger

The SMF determines that additional authentication is required for the requested data network.

The SMF contacts the authentication server (AAA server) to obtain authentication parameters.

Important parameters to check

Check:

  • authentication method used
  • SMF configuration
  • external authentication server connectivity

Step 3: Authentication Request

The network sends an Authentication Request message to the UE.

This message contains the authentication challenge.

Important parameters to check

Look for:

  • authentication method
  • challenge parameters
  • NAS message integrity

Step 4: Authentication Response

The UE calculates the response using credentials stored in the USIM or device credentials.

The UE sends Authentication Response back to the network.

Important parameters to check

Verify:

  • authentication response values
  • response timing
  • UE security context

Step 5: Session Establishment Continues

If authentication succeeds, the network continues the PDU Session Establishment procedure.

The UE receives PDU Session Establishment Accept, which includes:

  • IP address allocation
  • QoS parameters
  • session configuration

Common Authentication Methods

Method Description
EAP-AKA'Common authentication method in 5G
EAP-TLSUsed in enterprise networks
Operator-specific methodsCustom authentication mechanisms

Troubleshooting PDU Session Authentication

Authentication Failure

Possible causes:

  • incorrect credentials
  • USIM authentication failure
  • AAA server configuration issue

Authentication Timeout

Possible reasons:

  • AAA server unreachable
  • network latency
  • signaling failure

Session Establishment Rejected

Possible causes:

  • authentication policy mismatch
  • data network restrictions
  • slice authorization failure

Key Messages

Message Purpose
PDU Session Establishment RequestUE requests session
Authentication RequestNetwork challenges UE
Authentication ResponseUE responds to challenge
PDU Session Establishment AcceptSession established

Relevant 3GPP Specifications

The PDU Session Authentication procedure is defined by the 3rd Generation Partnership Project in:

  • 3GPP TS 23.502 - 5G System Procedures
  • 3GPP TS 24.501 - NAS Protocol
  • 3GPP TS 33.501 - 5G Security Architecture

Summary

The PDU Session Authentication procedure provides an additional layer of security when a UE accesses specific data networks or enterprise services.

It ensures that:

  • only authorized devices can access the data network
  • enterprise networks remain secure
  • operator services are protected

This mechanism plays an important role in secure 5G enterprise and private network deployments.