You can limit access to the security configuration files by using the permissions feature of the operating system. Allow only selected users to access the files. The users must include those who launch the applications requiring access to the authentication records.