They don't consult with any roll-your-very own authentication protocols you may have made making use of login web pages, and so forth. I'll use "login" to refer to authentication and authorization by techniques other than RFC2617 As for that growing AI assault surface, the increasing adoption of AI applications offers http://pigpgs.com