5 Security

This protocol uses the security mechanism of the underlying transport infrastructure, as specified in [MS-CMP] and [MS-CMPO]. Because the information that is exchanged in messages by this protocol can contain sensitive data—for example, the transaction identifiers and transaction manager addresses—implementers need to use mutual authentication, as specified in [MS-CMPO] section 2.1.3.<12>

For situations in which mutual authentication is not supported, implementers can provide the alternative transport security setting of incoming authentication.