Skip to main content

OmniAUSF Operations

1. Component Overview

OmniAUSF is the standalone Authentication Server Function (AUSF) for the Omnitouch 5G core. It orchestrates 5G-AKA authentication between the AMF and UDM, verifying UE authentication responses and deriving session keys. OmniAUSF was previously co-located within OmniUDM and is now deployed as an independent NF with its own SBI endpoint.

Each authentication session is managed by a dedicated process (process-per-auth-session). Authentication context is held in-memory for the duration of the authentication exchange and deleted on completion or failure.

2. 3GPP Role and Spec References

AspectReference
AUSF functional definitionTS 23.501 Section 6.2.8
Nausf_UEAuthentication serviceTS 29.509
5G-AKA authenticationTS 33.501 Section 6.1.3
HXRES*/HRES* computationTS 33.501 Annex A.5
KSEAF derivationTS 33.501 Annex A.6
UDM authentication data generationTS 29.503 Section 5.2.2
SQN resynchronisationTS 33.102 Section 6.3.5, TS 33.501 Section 6.1.3.4

3. SBI Endpoints

All endpoints are HTTP/1.1 with Content-Type: application/json.

Nausf_UEAuthentication (TS 29.509)

MethodPathDescriptionSuccess
POST/nausf-auth/v1/ue-authenticationsInitiate UE authentication (AMF -> AUSF)201 Created
PUT/nausf-auth/v1/ue-authentications/{authCtxId}/5g-aka-confirmationConfirm 5G-AKA (AMF sends RES*)200 OK

Error Responses

HTTP StatusCauseCondition
404USER_NOT_FOUNDUDM returned 404 for the subscriber
401AUTHENTICATION_FAILUREHRES* does not match HXRES*
500SYSTEM_FAILUREInternal error or UDM unreachable

4. Configuration Reference

OmniAUSF is configured via Elixir application environment under the :omniausf key.

Example Configuration

config :omniausf,
sbi_scheme: "http",
sbi_addr: "127.0.0.19",
sbi_port: 7777,
nrf_uri: "http://127.0.0.10:7777",
udm_uri: "http://127.0.0.12:7777",
mcc: "999",
mnc: "70",
heartbeat_interval: 10_000

Parameter Table

ParameterTypeDefaultDescription
sbi_schemestring"http"URI scheme for the SBI HTTP server
sbi_addrstring"127.0.0.19"IP address the SBI HTTP server binds to
sbi_portinteger7777TCP port the SBI HTTP server listens on
nrf_uristring"http://127.0.0.10:7777"Base URI of the NRF for NF registration and heartbeat
udm_uristring"http://127.0.0.12:7777"Base URI of the UDM for authentication vector generation and auth event storage
mccstring"999"Mobile Country Code for the serving PLMN
mncstring"70"Mobile Network Code for the serving PLMN
heartbeat_intervalinteger (ms)10000Interval at which OmniAUSF sends NRF heartbeat PATCH requests

5. Key Procedures

5.1 5G-AKA Authentication Flow

6. Prometheus Metrics

AUSF Metrics

MetricTypeTagsDescription
omni_ausf.auth.countcounterresultTotal authentication operations (initiated/success/failure)
omni_ausf.nrf.registration.statusgaugenf_typeNRF registration status (1=registered, 0=not)
omni_ausf.active_contexts.countgauge--Number of active AUSF UE authentication contexts

BEAM VM Metrics

MetricTypeDescription
beam.memory.totalgaugeTotal BEAM memory in bytes
beam.memory.processesgaugeMemory used by Erlang processes
beam.memory.systemgaugeSystem memory (ETS, atoms, code)
beam.processes.countgaugeNumber of Erlang processes
beam.vm.uptimegaugeVM uptime in seconds

7. Known Limitations

IDAreaDescription
AUSF-1In-memory stateAuthentication contexts are stored in memory only. State is lost on process restart. Active authentication sessions will fail on AUSF restart; the AMF must re-initiate authentication
AUSF-2EAP-AKA'Only 5G-AKA is supported. EAP-AKA' authentication method (TS 33.501 Section 6.1.3.1) is not implemented
AUSF-3Resync forwardingThe AUSF does not independently handle resynchronizationInfo; it passes through to UDM. The AMF must include resynchronizationInfo in the initial authentication request

8. Troubleshooting

Authentication fails with 404 User Not Found

The UDM returned 404 for the subscriber. Confirm:

  1. udm_uri is reachable from the OmniAUSF host.
  2. The subscriber IMSI exists in the UDM/UDR/HSS backend.
  3. The SUCI presented by the AMF is correctly formatted.

Authentication fails with 401 Authentication Failure

The AUSF computed HRES* from the received RES* and it did not match the stored HXRES*. This indicates the UE's credentials (Ki, OPc) do not match those in the backend, or the RAND/AUTN were corrupted in transit.

UDM unreachable (500 Internal Error)

Check udm_uri configuration and network connectivity. The AUSF logs AUSF auth failed for {supiOrSuci}: {reason} on UDM communication failure.

Authentication context not found on confirmation

The authCtxId in the PUT request does not match any active context. Contexts are deleted after successful or failed confirmation, and are lost on AUSF restart. The AMF must re-initiate authentication.