For securing access to the device, it's recommended to implement a third-party authentication server.