Skip to main content

IAM Architecture & Enterprise Implementation › Single Sign-On (SSO) and Federation

Single Sign-On (SSO) and Federation

Single Sign-On is one of the rare security controls that simultaneously improves security and user experience. Instead of forcing employees to maintain dozens of separate usernames and passwords — each one a potential breach vector — SSO lets them authenticate once and gain access to all their authorised applications. Federation extends this concept across organisational boundaries, enabling trusted access between separate organisations without sharing credentials.

For business leaders, SSO and federation are not just technical conveniences. They are strategic capabilities that reduce helpdesk costs, accelerate employee onboarding, improve security posture, and enable the kind of seamless partner collaboration that modern business demands.

How Single Sign-On Works

At its core, SSO separates the act of proving your identity from the act of accessing an application. Instead of each application maintaining its own user database and login page, all applications delegate authentication to a central Identity Provider (IdP). When a user attempts to access an application, the application redirects them to the IdP. The IdP verifies their identity (via password, MFA, biometrics, or whatever policy requires), and then sends a cryptographically signed assertion back to the application confirming “this person is who they claim to be.”

Diagram

SSO Authentication Flow: IdP-Initiated vs SP-Initiated

Sequence diagram showing: User clicks app (Service Provider) → SP redirects to IdP → IdP authenticates user (password + MFA) → IdP sends signed assertion to SP → SP grants access. Second flow shows IdP-initiated: User logs into IdP portal → clicks app tile → IdP sends assertion directly to SP.

The “single sign-on” part comes from session management. Once the IdP has authenticated you, it creates a session. When you access a second application, that application also redirects to the IdP — but the IdP recognises your existing session and immediately issues an assertion without prompting you to log in again. From the user’s perspective, they logged in once and everything just works.

The Protocols: SAML, OIDC, and OAuth 2.0

Three protocols dominate the SSO landscape. Understanding the differences matters for vendor evaluation and integration planning.

SAML 2.0 (Security Assertion Markup Language) is the enterprise workhorse. Developed in the early 2000s, it uses XML-based assertions exchanged between the IdP and the Service Provider (SP). SAML is mature, widely supported by enterprise applications (Salesforce, ServiceNow, Workday, AWS), and well-understood by security teams. Its primary drawback is complexity — SAML XML messages are verbose, and troubleshooting failed assertions can be painful.

OpenID Connect (OIDC) is the modern alternative. Built on top of OAuth 2.0, it uses lightweight JSON Web Tokens (JWTs) instead of XML. OIDC is simpler to implement, better suited to mobile and single-page web applications, and increasingly preferred by newer SaaS vendors. Google, Microsoft, and Okta all support OIDC natively.

OAuth 2.0 is technically an authorisation framework, not an authentication protocol — but it’s so commonly mentioned alongside SSO that executives need to understand the distinction. OAuth allows an application to access resources on behalf of a user (for example, a project management tool reading your calendar) without the user sharing their password with that application. OIDC adds an identity layer on top of OAuth to handle authentication.

A useful mental model: SAML is for enterprise SSO into web applications. OIDC is for modern and mobile applications. OAuth 2.0 is for authorised API access between applications. In practice, most organisations need all three.

Federation: SSO Across Organisations

Federation extends the trust boundary beyond your own organisation. It allows users from one organisation to access applications or resources in another organisation without creating duplicate accounts. This is essential for partner portals, supply chain collaboration, academic research networks, and government inter-agency access.

Federation works through trust relationships between Identity Providers. Organisation A’s IdP and Organisation B’s IdP agree to trust each other’s assertions. When a user from Organisation A needs to access Organisation B’s system, their home IdP issues an assertion that Organisation B’s system accepts — without Organisation B ever seeing or storing the user’s credentials.

Diagram

Federation Trust Models: Hub-and-Spoke vs Mesh

Two models side by side. Hub-and-spoke: central federation broker (e.g., Entra ID B2B or an identity broker) in the centre with partner IdPs connecting inward. Mesh: every organisation maintains direct bilateral trust with every other partner. Annotations show that hub-and-spoke scales better while mesh gives more direct control.

Hub-and-Spoke vs Mesh Federation

Hub-and-spoke uses a central federation broker or gateway. All partner organisations connect to the hub, and the hub handles trust translation between them. This model scales well — adding a new partner means one new connection to the hub, not connections to every existing partner. Microsoft Entra ID B2B, Okta Org2Org, and dedicated federation brokers like Shibboleth (common in higher education) use this pattern.

Mesh federation involves direct bilateral trust relationships between every pair of organisations. This gives each organisation maximum control and visibility but becomes exponentially complex as partners increase. With five partners you have ten trust relationships; with twenty partners you have one hundred and ninety. Mesh federation is typically only viable for small, stable consortia.

SSO Benefits and Risks

The business case for SSO is compelling, but it must be balanced against real risks.

Benefits:

  • Reduced password fatigue: Users manage one set of credentials instead of dozens, dramatically reducing the temptation to reuse passwords or write them down.
  • Lower helpdesk costs: Password resets typically account for 20-50% of helpdesk tickets. SSO eliminates this for integrated applications.
  • Faster onboarding and offboarding: Grant or revoke access to all integrated applications through a single identity, instead of configuring each application individually.
  • Stronger security posture: Centralised authentication means you can enforce MFA, conditional access, and session policies once, and they apply everywhere.
  • Better audit trails: All authentication events flow through a single IdP, giving you comprehensive visibility into who accessed what and when.

Risks:

  • Single point of failure: If your IdP goes down, users cannot access any integrated application. This makes IdP availability critical — review your provider’s SLA and build redundancy planning into your architecture.
  • Blast radius of compromise: If an attacker compromises a user’s SSO credentials, they gain access to every application that user can reach. This is why SSO must always be paired with strong MFA — SSO without MFA is more dangerous than no SSO at all.
  • Incomplete coverage: Applications that don’t support SAML or OIDC remain outside the SSO perimeter, creating shadow authentication silos. Track these gaps actively.

SCIM: Automated User Provisioning

SCIM (System for Cross-domain Identity Management) complements SSO by automating the creation, updating, and deletion of user accounts in downstream applications. Where SSO handles authentication (“let this person in”), SCIM handles provisioning (“create an account for this person with these attributes and these group memberships”).

Without SCIM, your IT team must manually create accounts in each application when someone joins, update them when roles change, and delete them when someone leaves. With SCIM, these lifecycle events propagate automatically from your IdP to all connected applications. This is particularly important for offboarding — SCIM-connected applications will automatically disable the leaver’s account when their identity is deactivated in the IdP.

Why This Matters

Organisations without SSO are statistically more likely to suffer credential-based breaches. Every additional password a user manages increases the probability of password reuse across personal and work accounts. SSO eliminates this class of risk for every application it covers. Federation, meanwhile, eliminates the dangerous practice of creating “guest accounts” with locally managed credentials for external partners — a practice that leads to orphaned accounts and audit gaps.

What to Do Now

  • Inventory your SaaS applications and categorise them: currently integrated with SSO, capable of SSO but not yet integrated, and not SSO-capable.
  • Check whether your IdP supports SCIM provisioning and identify which applications support SCIM on their end.
  • Review your IdP’s availability SLA and determine whether your SSO architecture has adequate redundancy.
  • Verify that MFA is enforced for all SSO-authenticated sessions — SSO without MFA increases rather than decreases risk.
  • If you have external partners accessing your systems, assess whether you’re using federation or managing guest accounts manually.

Evidence to Collect

  • A list of all applications integrated with SSO, showing which protocol each uses (SAML, OIDC).
  • Documentation of any applications not yet integrated with SSO and the plan to address them.
  • Evidence of SCIM provisioning configuration for key applications.
  • Your IdP’s uptime SLA and your disaster recovery plan for IdP outages.
  • MFA enforcement policy for all SSO-authenticated sessions.

Common Mistakes

  • Deploying SSO without MFA. This is the single most common and most dangerous mistake. SSO without MFA means one compromised password gives an attacker access to everything. Always enforce MFA at the IdP level.
  • Leaving applications outside SSO. Every application not integrated with your IdP is a shadow authentication silo with its own password policies, no centralised monitoring, and no automated deprovisioning. Treat SSO coverage as a metric and drive it toward 100%.
  • Ignoring session timeout policies. SSO sessions that never expire are a security risk. Balance user convenience with security by setting appropriate session lifetimes and requiring re-authentication for sensitive operations.
  • Treating federation as purely an IT decision. Federation establishes trust relationships with external organisations. Legal, compliance, and business stakeholders must be involved in defining what access federated partners receive and under what conditions.

Knowledge Check

Question 1 of 4

What is the most dangerous mistake organisations make when deploying SSO?

  • Choosing SAML over OIDC
  • Deploying SSO without enforcing multi-factor authentication
  • Using a cloud-based Identity Provider instead of on-premises
  • Integrating too many applications with SSO
Reveal Answer

B. SSO without MFA is more dangerous than no SSO at all. One compromised password gives the attacker access to every integrated application. MFA must always be enforced at the IdP level when SSO is deployed.

Question 2 of 4

What is the key difference between OAuth 2.0 and OpenID Connect?

  • OAuth is newer and more secure than OIDC
  • OAuth is an authorisation framework for delegated access; OIDC adds an identity/authentication layer on top of OAuth
  • OIDC uses XML while OAuth uses JSON
  • There is no meaningful difference — they are interchangeable
Reveal Answer

B. OAuth 2.0 is an authorisation framework that allows applications to access resources on behalf of a user. OpenID Connect (OIDC) is built on top of OAuth 2.0 and adds an identity layer to handle authentication — proving who the user is, not just what they can access.

Question 3 of 4

Why does hub-and-spoke federation scale better than mesh federation?

  • Hub-and-spoke is always faster
  • Adding a new partner requires only one connection to the hub, rather than bilateral connections to every existing partner
  • Mesh federation does not support SAML
  • Hub-and-spoke does not require any trust configuration
Reveal Answer

B. In hub-and-spoke, adding a new partner means establishing one connection to the central broker. In mesh, it means establishing bilateral trust with every existing partner — creating exponential growth in complexity (e.g., 20 partners = 190 trust relationships in mesh).

Question 4 of 4

What does SCIM provide that SSO does not?

  • Stronger encryption for authentication tokens
  • Automated user provisioning, updating, and deprovisioning in downstream applications
  • A better user login experience
  • Compliance with GDPR requirements
Reveal Answer

B. SSO handles authentication — letting a user in. SCIM handles the lifecycle — automatically creating, updating, and deleting user accounts in downstream applications when changes occur in the Identity Provider. This is critical for timely offboarding.



Summary Notes — SSO and Federation

Key Takeaways

  • SSO centralises authentication at a single Identity Provider, reducing password fatigue and improving security.
  • SAML 2.0 is the enterprise standard for web SSO; OIDC is the modern, lightweight alternative for mobile and SPA applications; OAuth 2.0 handles delegated authorisation.
  • Federation extends SSO trust across organisations — hub-and-spoke scales better than mesh.
  • SCIM automates user provisioning and deprovisioning across connected applications.
  • SSO without MFA increases risk — always enforce MFA at the IdP level.

Action Items

  1. Inventory all SaaS applications by SSO integration status (integrated, capable, not capable).
  2. Enforce MFA for all SSO-authenticated sessions at the IdP level.
  3. Evaluate SCIM provisioning for top-priority applications to automate lifecycle management.
  4. Review IdP availability SLA and establish a disaster recovery plan for IdP outages.

Compliance Relevance

SSO and federation map to ISO 27001 A.9.2 (User Access Management), A.9.4 (System and Application Access Control), NIST CSF PR.AC-1 and PR.AC-7 (authenticated and authorised access), and SOC 2 CC6.1–CC6.3. SCIM provisioning directly supports timely access revocation requirements under GDPR Article 17 (Right to Erasure) and ISO 27001 A.9.2.6 (Removal of Access Rights).