Control privileges at each individual server. Each server controls its own access security. When using inbound mapping, make sure that the new AuthID has the appropriate privileges to access data.