Single Sign-On
Single Sign-On is an authentication method that allows a user to log in once with a single set of credentials and then access multiple applications or websites without needing to log in again for each one. It simplifies the user experience by eliminating the need to remember and enter separate passwords for every system. SSO is commonly used in enterprise environments to streamline access to related but independent software systems.
Single Sign-On (SSO) is an authentication scheme in which a user authenticates once with a central identity provider, and that authenticated session is then leveraged to grant access to multiple independent software systems without requiring re-authentication. SSO implementations typically rely on federation protocols such as SAML and OpenID Connect to propagate session state and identity assertions between the identity provider and relying parties (service providers). While SSO reduces credential fatigue and can improve security posture by centralizing authentication controls, it also concentrates risk at the identity provider, meaning that compromise of the SSO credential or session token may grant an attacker access to all federated applications.
Why it matters
Single Sign-On directly affects an organization's security posture because it centralizes authentication at a single identity provider. This centralization offers significant advantages: it reduces credential fatigue, minimizes the number of passwords users must manage, and gives security teams a single point at which to enforce strong authentication policies such as multi-factor authentication. By reducing the total number of credentials in circulation, SSO can shrink the attack surface associated with weak, reused, or phished passwords across an enterprise application portfolio.
However, SSO also concentrates risk. If an attacker compromises the SSO credential or the session token issued by the identity provider, they may gain access to every federated application the user is authorized to reach. This makes the identity provider a high-value target. The 2023 breach of MGM Resorts, for example, involved social engineering of a help desk to gain access to identity infrastructure, which then allowed lateral movement across connected systems. Incidents like this illustrate how SSO, while beneficial for usability and centralized policy enforcement, demands rigorous protection of the identity provider itself, including phishing-resistant MFA, session token hygiene, and continuous monitoring of authentication events.
For application security practitioners, SSO is relevant not only as an infrastructure concern but also as a software integration concern. Each relying party (service provider) must correctly validate identity assertions, enforce token expiration, and handle session revocation. Misconfigurations in how an application consumes SAML assertions or OpenID Connect tokens can introduce vulnerabilities such as authentication bypasses, token replay, or improper audience validation, all of which can undermine the security that SSO is intended to provide.
Who it's relevant to
Inside SSO
Common questions
Answers to the questions practitioners most commonly ask about SSO.