5.1 Security Considerations for Implementers

The security considerations described in [MS-SPS2SAUTH] apply when implementing these extensions.