What is single sign-on?
Single sign-on (SSO) allows users to access a variety of tools and websites with a single authentication or login. SSO exchanges a verified certificate between an identity provider and a service provider; that certificate is then used in place of multiple passwords and usernames.
SSO often works on any browser or device type, making it accessible for any employee no matter what they use to do their jobs.
Many businesses implement single sign-on software to easily facilitate SSO for multiple apps. With SSO software, users log in to a dashboard where they can find every approved app or website in a single place.
Types of single sign-on
Organizations use a handful of different SSO types. Each one comes with a different set of requirements and purposes.
- Simple SSO: Sometimes called 'pure' SSO, simple SSO represents the basic scheme for all SSO software. It requires a single login to a central dashboard and provides access to all related applications.
- Adaptive SSO: This type of SSO, sometimes called contextual SSO, may ask users for additional verification if something new is discovered, like a new IP address, public WiFi connection, location, or tool. Additional verification may also be required with adaptive SSO if the user attempts to access sensitive data.
- Social login. Individuals more commonly use this SSO rather than businesses. It lets users connect their social media logins to access other third-party sites.
Benefits of single sign-on
SSO addresses many common employee issues by condensing multiple apps and logins into one place, including lost passwords and access issues. Because of this, SSO comes with plenty of benefits for the entire business.
- Simplified login processes for both users and IT admins
- Fewer password issues and lost passwords, saving IT admins time and reducing service tickets
- Fewer password resets
- Prevents poor password habits and hygiene
- Easier user provisioning and de-provisioning
- Improved user experience for employees
- Ability for IT admins to control access and level of access for each app based on predefined user roles
- Faster access to apps and websites, which is especially important for high-pressure industries like healthcare
Disadvantages of single sign-on
Though SSO provides many benefits and time-saving features to companies, the very nature of a single sign-on process poses certain issues.
- Encountering apps with additional levels of security that don’t allow SSO access, potentially causing a disjointed user experience
- Not as secure as other login authentication methods, like two-factor and multi-factor
- Potential security risk and data breach if hackers gain access to an employee’s SSO password
- No access to SSO-friendly apps if its software goes down or becomes otherwise unavailable
- Long set-up time, especially for larger teams with multiple user roles and access levels
Single sign-on best practices
Though SSO is relatively easy to set up, some best practices to keep in mind when implementing and maintaining it for a company are discussed here. They will help maximize the security benefits of SSO.
- Always check for support and compatibility. Some apps and websites won’t work with SSO. It’s best to know that ahead of time.
- Create detailed user roles to make user provisioning and setup easy. This saves IT admins from doing a lot of repetitive work within each app for each employee.
- Ensure the SSO setup is compliant with relevant regulations. Especially in industries bound by privacy and data regulations, SSO can occasionally pose a security risk. Double-check any regulations before implementing SSO.
- Set session timeouts. Signing users out of websites and apps after a specified idle period reduces security risk.
- Have complex passwords. Determining a required password length and a minimum number and symbol count makes for stronger passwords, better protecting the user and the company from hackers.
SSO vs. 2FA vs. MFA
SSO stands for single sign-on. It enables a single authentication for automatic login to multiple authorized apps and websites, eliminating the need to remember multiple passwords and constantly log in to tools.
2FA is short for two-factor authentication. This method requires two forms of identification to access apps and websites. It often involves some form of one-time code, security question, or fingerprint. 2FA is occasionally referred to as two-step verification or dual-factor authentication.
MFA, or multi-factor authentication, is the most protected of login methods, requiring users to double- or triple-verify their identity. For example, MFA logins may require a username and password, security pin, and fingerprint, instead of just one or two.
Looking to provide more layers of security and verification than what SSO provides? Learn everything you need to know about multi-factor authentication.

Whitney Rudeseal Peet
Whitney Rudeseal Peet is a former freelance writer for G2 and a story- and customer-centered writer, marketer, and strategist. She fully leans into the gig-based world, also working as a voice over artist and book editor. Before going freelance full-time, Whitney worked in content and email marketing for Calendly, Salesforce, and Litmus, among others. When she's not at her desk, you can find her reading a good book, listening to Elton John and Linkin Park, enjoying some craft beer, or planning her next trip to London.