Because not all remote applications can be completely trusted, it is often a good idea to limit the privileges of the remote application.
For information on how to do this by using access controls, see Section 12.4, Managing Access Controls for Remote Applications.