5.1 Security Considerations for Implementers

This protocol specifies no authentication or authorization mechanisms. A protocol server can perform implementation-specific authorization based only on evidence from underlying transport mechanisms. In operation, transport layer access to the protocol servers can be restricted to known protocol clients, such as other machines in the farm.