The systems we use at work contain several web-based applications that were developed by a third-party and currently use their own method of authentication. I\'ve been tasked wi