5.1.1 Authentication Levels

Implementations can create programming interfaces and corresponding documentation for accessing functionality offered by these extensions in a way that encourages higher-level protocols to use authentication levels of RPC_C_AUTHN_LEVEL_PKT_INTEGRITY and RPC_C_AUTHN_LEVEL_PKT_PRIVACY. Lower authentication levels provide weak security only. If integrity or confidentiality protection is requested, it SHOULD be provided either by the security provider or by using the verification trailer, as specified in section