Single Sign-On (SSO)

12th November 2020 | Cybrary Single Sign-On (SSO)

Single Sign-On (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials. SSO works based on relationships (two-factor authentication) set up between an application and an authenticator, like LastPass or Google Authenticator. This trust relationship is often based upon a certificate that is exchanged between the authenticator and the service provider. This certificate can be used to sign identity information that is being sent from the authenticator to the service provider so that the service provider knows it is coming from a trusted source. In SSO, this identity data takes the form of tokens which contain identifying bits of information about the user like a user’s email address or a username.

Source: OneLogin

Additional Reading: How Single Sign-On Works

Related Terms: Two-Factor Authentication, Password Manager

What does this mean for an SMB?

Single Sign-On is a tool SMBs should consider adopting to assist in authenticating and managing users within your organization. Check out our article on Two-Factor Authentication to see what CyberHoot recommends in regards to strongly authenticating users. Any SSO solution you adopt must also support multi-factor authentication to properly secure users and their accounts. 

Simplified User Access and Account Management

SSO is a great solution not only to simplify authentication across any organization, but also to keep your enrolled user lists and master database of active and inactive users current.  Managing a large number of online Software-as-a-Service solutions can be a daunting task.  However, SSO can greatly simplify the work of managing those solutions while simultaneously simplifying the number of passwords your users must remember to access the solutions.  It’s truly a Win-Win and something to be strongly encouraged in any company.

To learn more about Single Sign-On, watch this short 2 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Ever had your phone suddenly lose service for no reason, followed by a flood of “reset your password”...

Read more