Because not all remote applications can be completely trusted, it is a best practice to limit the privileges of the remote application.
For information on how to do this by using access controls, see Section 12.4, Managing Access Controls for Remote Applications.