2.2.4 Client-to-DC Operations

This section describes the security and mutual authentication requirements for those DRS Remote Protocol operations that involve client-to-DC interactions.