Single sign-on (SSO) is an authentication method that allows users to access multiple applications and services with a single login. In practice, SSO centralizes authentication through an identity provider (IdP), so users sign in once and gain access to approved apps without re-authenticating each time. SSO is often paired with multifactor authentication (MFA) to strengthen access security and reduce password reset chaos.
Key Points
One login, many apps: Users authenticate once via an IdP, then access approved applications without repeated sign-ins.
Less password sprawl: Fewer passwords mean fewer resets, fewer sticky-note “security strategies,” and fewer weak/reused credentials.
Better security when combined with MFA: SSO reduces password exposure, while MFA reduces account takeover risk if credentials are stolen.
Centralized control and visibility: Access policy, provisioning signals, and audit trails are easier to manage when authentication is unified.
Bigger blast radius if misconfigured: If an SSO account is compromised and controls are weak, attackers can quickly gain broad access.
Modern employees use a variety of tools, including legacy enterprise applications, cloud services, SaaS platforms, and mobile apps. Since each application requires a unique login, comprehensive identity security is crucial, as organizations face threats from three directions:
Users end up managing too many passwords, which leads to predictable shortcuts and easy wins for attackers.
When identity is siloed across apps, onboarding and access changes are manual, slow, and error-prone. That’s how you get:
For the broader control layer, see access management and access control (Access management, Access control).
SSO typically involves three building blocks:
Common SSO protocols include:
A typical flow looks like this:
Modern SSO solutions simplify access by centralizing authentication and integrating with common enterprise directories and credential stores.
SSO amplifies whatever controls you put behind it. When implemented with strong authentication, granular access controls, and monitoring, it reduces risk and friction. When it’s misconfigured or under-protected, it can turn one compromised login into fast, broad access across your environment.