Security considerations
RTMP authentication
Authentication at origin
Firewall protection at origin