Methods and systems for controlling the scope of delegation of authentication data