Understanding Security Permissions
Even though this chapter treats permissions and deployment separately, you must treat them in practice as one inseparable topic. This section and the previous section on deployment (as they relate to permissions and form features allowable in Web-based forms) are extremely important for planning purposes. Make sure you have a firm grasp on these subjects before you start implementing forms or you will very likely waste a lot of valuable time.
Some Common Rules
First, a couple of rules apply universally to all Web-accessible forms and InfoPath client-accessible forms regarding accessing data that is outside the local domain:
Web-accessible forms cannot access data outside the local domain boundaries, which is a security ...