5.1 Security Considerations for Implementers

This protocol relies on the web server that hosts the application to perform authentication.

Show: