4.3 Managing Access Control for Remote Applications

Because not all remote applications can be completely trusted, it is often a good idea to limit the privileges of the remote application.

For information on how to do this by using access controls, see Section 12.4, Managing Access Controls for Remote Applications.