5.1 Security Considerations for Implementers

Implementers have to ensure that SSL is used to authenticate that the server is the intended server referred to by the server endpoint URL. Otherwise, there are no specific security considerations beyond those specified in normative references.