5.1 Security Considerations for Implementers
This protocol allows any user to establish a connection to the RPC server. The protocol uses the underlying RPC protocol to retrieve the identity of the caller that made the method call as specified in [MS-RPCE]. Clients might need to create an authenticated RPC connection. Servers can use this identity to perform specific access checks.