cgrc video for during the implementation of a new access control system, it is discovered that some legacy applications do not support the new authentication
During the implementation of a new access control system, it is discovered that some legacy applications do not support the new authentication protocols. What is the best approach to ensure these applications are still secured?