5.1 Security Considerations for Implementers
There are no known additional security considerations for these protocol extensions, but implementers have to consider the security implications of the data that they expose by way of these extensions. When exposing access to directory objects that can contain sensitive information, server implementers are encouraged to use transport mechanisms that support encryption and integrity-verification of the messages. Server implementers are also encouraged to enforce access controls prior to performing any operation against a directory object.