SSO’s challenges Extra-strong passwords must be enforced. If an SSO
account is cracked, others under the same authentication can also be
endangered. When SSO is down, access to all connected sites is
stopped. This is a big reason to exercise great care in choosing an
SSO system. It must be exceptionally reliable and plans should be in
place for dealing with breakdowns. What’s more, when your identity
provider goes down, your SSO does too. The provider’s vulnerability to
any kind of interruption becomes your vulnerability as well, and it is
probably beyond your control. Once again, the choice of vendors is
critical.
If a hacker breaches your identity provider user account, all your
linked systems could be open to attack. This can be a classic single
point of failure and should be headed off in the planning process. On
the plus side, high-quality identity providers have top-notch
security.
SSO can take longer than expected to set up. Each environment is
different, so added steps in implementation can crop up. One example
is the task linking the identity provider to the service provider.
SSO is risky for multi-user computers. What happens when one user is
logged in and another needs to use the machine?
Reduced sign-on (RSO) may be needed to accommodate different levels of
access. With RSO, additional authentication servers may be required.
SSO using social networking services can create conflict. This can be
the case with workplaces that block social media sites and government
connections where censorship is involved.
Some SSO-linked sites may give their user data to third-party
entities. This is an area requiring careful attention.
[The Pros and Cons to Single Sign-On (SSO)] [1] (RenovoData, 2019)
I also found this link helpful, especially this section:
One misconception about using an SSO solution is that it weakens
security. The argument rests on the premise that if a master password
is stolen, all related accounts will be compromised.
In theory, this appears to be true, but with common-sense practices,
SSO can actually reduce password theft. How?
Since users only need to remember one password for multiple
applications, they’re more likely to create a stronger (harder to
guess) passphrase, and less likely to write it down. These best
practices reduce the risk of password theft.
As explained in the next section, a single sign-on strategy can also
be combined with multi-factor authentication (MFA) for extra security.
[7 Benefits of Single Sign-On (SSO) and Why Your Business Needs It][2]
(Gupta, 2020)
A simpler explanation can found here: [The Advantages and Disadvantages of Single-Sign-On (SSO) Technology (mini-whitepaper)][3]
[1]:RenovoData. (2019, January 17). The Pros and Cons to Single Sign-On (SSO): RenovoData - The Data Protection Blog. https://www.renovodata.com/blog/2019/01/17/single-sign-on
[2]: Gupta, D. (2020, May 13). 7 Benefits of Single Sign-On (SSO) and Why Your Business Needs It. Identity Blog. https://www.loginradius.com/blog/2019/11/benefits-single-sign-on-sso/
[3]: Gupta, D. (2020, May 13). 7 Benefits of Single Sign-On (SSO) and Why Your Business Needs It. Identity Blog. https://www.loginradius.com/blog/2019/11/benefits-single-sign-on-sso/