Rules for setting up security model B for RPCs

Follow these rules when setting up security model B for RPCs: