1.5 Prerequisites/Preconditions
It is assumed that the protocol client has obtained the name of a server computer that supports this protocol and the name of a queue hosted on the server before this protocol is invoked. This specification does not mandate how a client acquires this information.
It is assumed that the protocol client has access to a private encryption key used to decrypt messages. A private key typically is stored in a secure location on the local host.