For data sources to work correctly, the authentication method used on the original server must be copied to the data sources ...