Perhaps the most important security facility is the authenticated remote procedure call (RPC) facility. Authenticated RPC enables distributed applications to participate in authenticated network communications. Applications using the authenticated RPC routines may select the authentication protocol and the authorization protocol to be used, and set various protocol-independent protection levels for communicating with remote entities (users, servers, and computers).
The use of authenticated RPC is explained in Basic RPC Routine Usage and RPC and Other DCE Components. RPC and Other DCE Components contains information about a number of RPC routines that relate directly to security issues, such as rpc_binding_set_auth_info( ).
These security topics, however, contain conceptual information that is useful for understanding the authentication and authorization protocols that authenticated RPC routines use; for this information, we recommend that you also read Authentication and Authorization.