User Authentication by Third-Party Server

For securing access to the device, it's recommended to implement a third-party authentication server.