Streamline the authentication process by enabling reuse of authentication results across multiple systems thus enhancing user experience, reducing efforts from relying parties and strengthening security
Inputs
Organization policies
IT Systems
IT Change Management
IT Project Management
Activities
Design SSO
Deploy SSO
Maintain SSO
Optimize SSO
Outputs
IT Systems that reuse centralized or federated authentication
Indicators
Scopes
Risks
The deployment of SSO reinforces security, even though it may marginally increase risk in certain circumstances, e.g. when an identity is compromised (/wiki/spaces/QUOT/pages/76021898). This risk is typically offset by the concomitant implementation of MFA.