Greetings fellow feline, I am a microbiologist not IT. In that capacity, the only general suggestion is to have redundant authentication measures that cannot all be crippled by one source like this. I can't imagine it's popular, or easy, for a company to want to be able to use multiple authentication schemes, but this sort of situation shows why lock-in is a bad idea.