This is a dedicated watch page for a single video.
During the implementation of a new access control system, it is discovered that some legacy applications do not support the new authentication protocols. What is the best approach to ensure these applications are still secured?