I’m not sure this is the right forum for this type of discussion. I would not like to recommend something that may have been put into place by your organization to prevent unauthorized access to services or equipment. Please contact a local IT support person at your organization to discuss this. If YOU are the authorized IT person, please leave more details about what type of system this is and any other details you have available. Different tools are used for different systems.