[Question] about how access control is performed when using PIM