They are not usually intended for exposure for calling from scripts or other applications, so you can design them to rely on the security context set by the caller (the Principal object of the thread) or the authentication mechanism of your remoting strategy.