Legacy authentication bypassed modern security controls and logging.