5.1 Security Considerations for Implementers

Because operations specified by this protocol modify configuration of the index server, in addition to the security considerations applicable to the underlying protocols, implementers are advised to consider user authorization on the server for performing the requested operation.