5 Security

All security considerations that apply to DCOM interfaces, as specified in [MS-DCOM] section 5, are also applicable to the DFS-R Helper Protocol.

In addition, the IADProxy and IADProxy2 interfaces expose methods for changing Active Directory configuration objects. These configuration objects have restricted access, as specified in section 1.3. Before processing the methods of IADProxy and IADProxy2, an implementation of the DFS-R Helper Protocol verifies the identity of the caller and verifies that the caller has privileges to change these objects. The details of this check are implementation-specific and depend on the security model of the implementation.<63>