5.1 Security Considerations for Implementers

Additional discussion of security considerations can be found in [ID-LDAPCHANGELOG] section 10, [ID-LDAPVLV] section 10, [RFC5246] appendix F, [RFC5246] section 7, [RFC2696] section 6, [RFC2829] section 12, [RFC2831] section 3, [RFC2891] section 4, [RFC4178] section 7, and [RFC4511] section 6.