By default, NetTcpBinding uses transport security, with a list of default features.
Signing and encrypting messages in this context does not mean the same as in message security. Rather, it means that all data packets sent over the network transport are signed and encrypted. It is independent of certificates. This is done by the security providers installed in the operating system on the sending and receiving machines, called through SSPI ( Security Support Provider Interface ) - the same mechanism that is used, for example, when domain credentials are used to access some resources, such as a file on another car on the network.
Before any application data is sent over the connection, the binding organizes an SSPI handshake between the sender and receiver, specifying the Negotiate security package (this selects either NTLM or Kerberos as the actual security protocol, depending on the capabilities of the respective host machines). Security labels are exchanged over the connection as part of this handshake, at the end of which the security supporters of the parties will have agreed session keys for use in signing and encrypting subsequent application messages.
source share