A logo for soteria technology solutions with a spartan helmet

Bad Passwords Part 4 - SSO: One and Done

Erin Patten • June 23, 2022

SSO: One and Done 

SSO, short for Single Sign On.  You've probably used it and not even realized it. 

So what is it?  Is it a good idea?

 

Welcome to the fourth and final episode in our Bad Passwords series. (See Part 1 , Part 2, and Part 3) There's only one more major player in the authentication game to talk about, and that is Single Sign On (SSO).


Basically, SSO allows you to sign in once, and use several different software tools.  For example, logging into your Microsoft account, and being able to open Outlook and Word and Excel without having to log in again?  That is SSO in action.


How does it work?


Well...  there are a few different frameworks, and they use agents and tokens and policy servers... you know, for most people's purposes, it's neither interesting nor important.  The better question is:


Is it a good idea?


In some cases, like with Microsoft 365, or Google apps, or Adobe Creative Suite, it is a moot point; if you want to use the software, you do things their way.  That said, just like most things there are pros and cons, but in a nutshell:  SSO is a powerful tool that can increase online security and make using apps a lot more user friendly.   


The Pros:

  • SSO works really well in organizational situations where an IT team is managing a suite of approved applications.  Fewer passwords means fewer lost passwords for IT to fix, and if an employee leaves, changing one login will completely lock them out of the system.
  • SSO makes things easier for end users, both in not having to constantly keep logging in, and in having fewer passwords to remember.
  • It lessens the chances of phishing, and fewer passwords mean fewer hackable access points.


The Cons:

  • SSO really needs to be paired with MFA (Multi-Factor Authorization) to make sure the login is legitimate, because:
  • If the login does get cracked or hacked, the intruder has the proverbial "keys to the castle."
  • Be especially careful using SSO provided by social networks, such as Facebook, for third-party applications, they can be less secure.



So where does that leave us?  Mostly, just being aware that SSO exists, and when you are using it, being thoughtful about when and how you log in and log out.  SSO or not, use good password practices and make good decisions :) 


Any questions about good password practices?  Revisit Part 1 , Part 2, and Part 3 in our Bad Passwords series.


Thanks for reading! 



As always, if you have any questions or concerns about cybersecurity

and/or password management, give us a ring!


Contact Us

This post, like all our posts, is 100% written by a human.

Share this Post

A woman hides her face behind a library book
December 10, 2024
A rare win this month, these scammers are in trouble.
a book with fanned pages and blurry background
By Erin Patten November 20, 2024
Revisiting the Ghost Books Scam - with real-world consequences.
The insightly podcast logo
November 1, 2024
Tariq talks all things cybersecurity with the podcast hosts Alyssa and Jordan.
the silhouette of a woman's face is covered with a projection of green computer code
September 30, 2024
A freely accessible database containing full background data for about a third of all Americans was just uncovered on the internet.
A new two-story home with a soft pink and blue sunset in the background.
August 28, 2024
Real Estate scams and wire fraud costs Americans hundreds of millions of dollars every year. One victim shares her story.
A 19th century engraving of three rough and hungry looking children searching for potatoes.
July 24, 2024
A look at what insights history can offer us about how things like this happen.
A closeup photo of a boxer's shoulders and arms. They are wearing black boxing gloves.
By Erin Patten July 8, 2024
Gigantic password leaks keep rolling in; and they keep getting bigger. How can you keep your accounts safe?
A screenshot from KSN Channel 3, of a newscaster speaking in front of a screen showing computer code
June 24, 2024
Cyberattacks have led to an outage in the software car dealerships across North America use to run their operations - making dealerships rely on pen and paper again, and putting untold amounts of personal data at risk.
A robot hand explores a blue imagined universe of connected webs of dots
By Erin Patten June 17, 2024
Researchers recently proved that GPT-4 can find and exploit unknown security weaknesses - by itself. It's a whole new world for cybersecurity.
More Posts
Share by: