5.1 Security Considerations for Implementers

WFDA2A is built on top of WFSimple and uses its security models. WFSimple outlines the security model for key exchange used while establishing the L2 and L3 connections. For details about the security model, see [WF-WSC2.0.2]