They don't make reference to any roll-your-very own authentication protocols you may have designed applying login web pages, and so on. I'll use "login" to consult with authentication and authorization by procedures aside from RFC2617 As for your growing AI assault floor, the increasing adoption of AI applications provides hackers http://pigpgs.com