For IDD to have access to a resource, it must be flagged as SECURE in the Secure Resources tool.
You must make sure that all of the design objects configured earlier are configured as SECURE resources.
Party base object, including associated:
match rule sets, which are used in IDD for Search for Duplicates (potential matches)
content metadata (HISTORY, RAW, and XREF), which are used in IDD to display the change history, cross references, and raw records
cleanse functions used for data entry
packages used for Search results
Consider creating resource groups to organize IDD-accessible resources and to expedite security configuration.
If you want to prevent all IDD users from having access to a certain resource, make it PRIVATE. For example, you could globally hide IDD access to RAW records in this way.