Cybersecurity Glossary

What Is Single Sign-On (SSO)?

Single sign-on, or SSO, lets users sign in once through a trusted identity provider and access multiple connected applications. It can make access easier for employees and easier to manage for IT teams.

Short definition

Single sign-on is an authentication method where one central login gives users access to multiple approved systems. SSO reduces password fatigue and can improve control when combined with MFA and monitoring.

At a glance: SSO simplifies access, but it also makes the central identity account especially important to protect.

Single Sign-On Meaning

Without SSO, users may need separate usernames and passwords for many applications. That can encourage password reuse, forgotten passwords, inconsistent access, and slower offboarding.

SSO centralizes authentication through an identity provider. After the user signs in, connected applications trust the identity provider to confirm who the user is and whether access should be allowed.

For organizations, SSO can improve visibility and control. IT teams can enforce MFA, disable access from one place, review application access, and monitor unusual login behavior.

For users, SSO means fewer passwords to manage. The tradeoff is that the main account becomes more valuable to attackers, so suspicious prompts, fake login pages, and unexpected MFA requests deserve careful attention.

How SSO Works

SSO relies on a trusted identity provider and connected applications.

  1. The user requests an application. They open a cloud app, portal, or business system.
  2. The app redirects to the identity provider. The user signs in through the organization identity provider.
  3. Authentication is checked. The provider may require a password, MFA, device check, or conditional access rule.
  4. A token confirms access. The identity provider tells the application the user is authenticated and authorized.
  5. Access is managed centrally. Administrators can adjust policies, revoke sessions, and remove app access.

Common SSO Examples

SSO appears in many everyday business login flows.

  • Cloud app login: A user signs in once and accesses email, file sharing, and project tools.
  • Employee portal: HR, payroll, benefits, and learning systems use the same identity provider.
  • MFA-backed SSO: Sensitive apps require a second factor before access.
  • New hire onboarding: A user receives access to multiple apps through assigned groups.
  • Offboarding: Disabling one identity account removes access to many connected applications.

Why SSO Matters

SSO can reduce password sprawl. Fewer passwords can mean fewer reused passwords, fewer resets, and better control over access.

It also improves administration. Central identity makes it easier to apply MFA, monitor logins, remove access, and enforce consistent policies.

The central account becomes a high-value target. If attackers steal credentials or hijack a session, they may try to reach every app connected to SSO.

How to Secure SSO

SSO should be paired with strong identity controls and user awareness.

  • Require MFA. The central login should not rely on a password alone.
  • Use conditional access. Device health, location, risk, and app sensitivity can influence access decisions.
  • Review application access. Users should only have access to apps they need.
  • Monitor suspicious logins. Watch for impossible travel, new devices, repeated failures, and unusual session behavior.
  • Train users on fake SSO pages. Attackers often imitate familiar login portals to steal credentials or sessions.

What to Do if an SSO Account Is Compromised

A compromised SSO account can affect many applications, so response should be broad.

  1. Revoke sessions. Sign the user out of connected apps and remove suspicious tokens.
  2. Reset credentials. Change the password and review MFA methods from a trusted device.
  3. Review connected apps. Check files, email, admin actions, integrations, and app activity.
  4. Look for phishing paths. Determine whether a fake login page, malicious link, or stolen session caused the compromise.

Related Single Sign-On (SSO) Terms

SSO depends on strong MFA and protection against stolen credentials.

Single Sign-On (SSO) Takeaway

SSO can make security and user experience better at the same time, but it concentrates risk around identity.

The safest SSO programs combine MFA, access reviews, monitoring, fast offboarding, and users who report suspicious login prompts.

Share This Page

Send this glossary page to a teammate, client, or employee who needs a quick explanation.

FAQ

Questions Teams Ask About SSO

Quick answers about single sign-on, identity providers, MFA, business benefits, and account compromise.

What is single sign-on?

Single sign-on is an authentication setup that lets users access multiple applications after signing in through one trusted identity provider.

What does SSO stand for?

SSO stands for single sign-on.

Is SSO secure?

SSO can improve security when paired with MFA, strong identity governance, monitoring, and fast offboarding.

What is the main risk of SSO?

If the central identity account is compromised, attackers may reach many connected applications unless strong controls are in place.