Export (0) Print
Expand All

5.1 Security Considerations for Implementers

This protocol allows any user to connect to the server; therefore, any security weakness in the server implementation could be exploitable. The server implementation should enforce security on each method.

 
Show:
© 2014 Microsoft