Export (0) Print
Expand All

5 Security

This protocol uses the security mechanism of the underlying transport infrastructure, as specified in [MS-CMP] and [MS-CMPO]. Because the information that is exchanged in messages by this protocol can contain sensitive data—for example, the transaction identifiers and transaction manager addresses—implementers SHOULD use mutual authentication, as specified in [MS-CMPO] section 2.1.3.<12>

For situations in which mutual authentication is not supported, implementers SHOULD provide the alternative transport security setting of incoming authentication.

 
Show:
© 2014 Microsoft