But as you pointed out this is typically a stupid thing.

Reasons being sometimes an alternate authentication system needs to be defined to guarantee access to remote systems even when the primary and perhaps secondary authentication systems are unavailable.

But, given that now a days there are other ways to get access (RIB Boards, Remote KVMs etc...) this makes entirely ZERO sense.