1 | The application acquires a set of credentials |
2 | A pair of communicating applications establish a joint security context using their credentials |
3 |
Per-message services are invoked to apply either:
|
4 | At the completion of a communication session the peer application delete the security context |