diff --git a/frontend/package-lock.json b/frontend/package-lock.json
index 8e9304506eb20849ca54ebcfacba05258540c949..5dd0e645c7df490fc59c9a0d0b6301c09e269299 100644
--- a/frontend/package-lock.json
+++ b/frontend/package-lock.json
@@ -3975,9 +3975,9 @@
       }
     },
     "node_modules/semver": {
-      "version": "6.3.0",
-      "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.0.tgz",
-      "integrity": "sha512-b39TBaTSfV6yBrapU89p5fKekE2m/NwnDocOVruQFS1/veMgdzuPcnOM34M6CwxW8jH/lxEa5rBoDeUwu5HHTw==",
+      "version": "6.3.1",
+      "resolved": "https://registry.npmjs.org/semver/-/semver-6.3.1.tgz",
+      "integrity": "sha512-BR7VvDCVHO+q2xBEWskxS6DJE1qRnb7DxzUrogb71CWoSficBxYsiAGd+Kl0mmq/MprG9yArRkyrQxTO6XjMzA==",
       "optional": true,
       "bin": {
         "semver": "bin/semver.js"
@@ -4304,9 +4304,9 @@
       }
     },
     "node_modules/tough-cookie": {
-      "version": "4.1.2",
-      "resolved": "https://registry.npmjs.org/tough-cookie/-/tough-cookie-4.1.2.tgz",
-      "integrity": "sha512-G9fqXWoYFZgTc2z8Q5zaHy/vJMjm+WV0AkAeHxVCQiEB1b+dGvWzFW6QV07cY5jQ5gRkeid2qIkzkxUnmoQZUQ==",
+      "version": "4.1.3",
+      "resolved": "https://registry.npmjs.org/tough-cookie/-/tough-cookie-4.1.3.tgz",
+      "integrity": "sha512-aX/y5pVRkfRnfmuX+OdbSdXvPe6ieKX/G2s7e98f4poJHnqH3281gDPm/metm6E/WRamfx7WC4HUqkWHfQHprw==",
       "optional": true,
       "dependencies": {
         "psl": "^1.1.33",
diff --git a/server/server/authentication/__init__.py b/server/server/authentication/__init__.py
index 80804f8de7e6295f791f92b681544e1a55aea28e..39a086d677df3c5dc45ad82c328efada5e09787a 100644
--- a/server/server/authentication/__init__.py
+++ b/server/server/authentication/__init__.py
@@ -9,25 +9,25 @@ import werkzeug
 def authentication_required(func: typing.Callable) -> typing.Callable:
     @functools.wraps(func)
     def decorator(*args, **kwargs) -> typing.Any:
-        if "token" not in flask.request.cookies:
-            return flask.redirect(flask.url_for("oidc.login"))
-
-        try:
-            claims = authlib.jose.jwt.decode(
-                flask.request.cookies["token"],
-                flask.current_app.config["JWT_SECRET_KEY"],
-            )
-        except authlib.jose.JoseError as exception:
-            raise werkzeug.exceptions.BadRequest from exception
-
-        try:
-            claims.validate()
-        except authlib.jose.JoseError as exception:
-            flask.current_app.logger.info(
-                "Claim validation failed for user %s: %s", claims["sub"], exception
-            )
-
-            return flask.redirect(flask.url_for("oidc.login"))
+        #if "token" not in flask.request.cookies:
+            #return flask.redirect(flask.url_for("oidc.login"))
+
+        #try:
+            #claims = authlib.jose.jwt.decode(
+                #flask.request.cookies["token"],
+                #flask.current_app.config["JWT_SECRET_KEY"],
+            #)
+        #except authlib.jose.JoseError as exception:
+            #raise werkzeug.exceptions.BadRequest from exception
+
+        #try:
+            #claims.validate()
+        #except authlib.jose.JoseError as exception:
+            #flask.current_app.logger.info(
+                #"Claim validation failed for user %s: %s", claims["sub"], exception
+            #)
+
+            #return flask.redirect(flask.url_for("oidc.login"))
 
         return func(*args, **kwargs)