Risks of SSO
đ MYTHBUSTERS: IS SSO ALWAYS SECURE?
đŹ The Experiment Begins...
â

â
Today on MythBusters, weâre putting to the test a widely believed cybersecurity myth:
âSSO is completely secure and eliminates all risks.â
Sounds great, right? No more password headaches, fewer logins, and a seamless experience. But what if we told you... that might not be entirely true?
To find out, our lead investigator Adam is teaming up with Jamie, our in-house security expert. Theyâre going to put SSO to the test and see where it might fail.
Letâs bust some myths!
đĽ MYTH #1: âThe SSO Provider Cannot Be Compromisedâ
â

â
The Setup
In order to receive a secure authentication token, Adam needs to log into his Google account. In order to do so, Adam is using his email and a strong password that he remembers well.
But what if an attacker knew Adamâs password? Or what if an attacker was able to mimic the Google login page? Would they be able to use it to eventually impersonate Adam?
The Experiment
Jamie sets up a phishing attackâa fake Google login page that looks exactly like the real one. Adam, thinking itâs legit, enters his username and password.
BOOM. Jamie can now log into Google as Adam and uses his stolen credentials to log into all the companyâs apps.
The Result
â Myth Busted! SSO natively creates a Single-Point-Of-Failure that attackers are eager to exploit, and often do it in real life.
How to stop this from happening?
- Use a password manager to avoid employees using weak passwords or reusing password across applications
- Use Multi-Factor-Authentication (MFA) on your SSO provider (like a physical security key or biometric login).
- Train employees to spot phishing attacks and verify links before entering credentials.
đĽ MYTH #2: âStolen Tokens Are Uselessâ
â

â
The Setup
In order to get access to his apps Adam gets a secure authentication token from his SSO provider that is passed to the applications. This token is his golden ticketâit proves to all apps that heâs Adam and that heâs allowed in.
But what if an attacker gets their hands on it? Would they be able to use it and impersonate Adam?
The Experiment
Jamie sets up a man-in-the-middle attack (MIM attack)â for example by installing a compromised web browser on Adamâs computer. Adam, unaware that any action data transferred is copied by an attacker, simply logs in with his SSO.
BOOM. Token stolen.
Jamie now uses Adamâs stolen token to log into all the companyâs apps.
The Result
â Myth Busted! Stolen tokens can be used just like real ones, it is called a âtoken replay attackâ. While it is a sophisticated attack, it represents 5% of all identity attacks, and has doubled in volume over 2024.
How to stop this from happening?
- Use modern browsers that are less prone to MIM attacks
- Protect your endpoints laptops and mobile phones can be infected by malwares
- Protect your networks with WEP/WAP Encryption and make sure to change your routerâs admin credentials
- Make sure the websites you visit are using HTTPS
- Use secure VPNs when on public WiFi
⥠MYTH #3: âExpired Tokens Cannot Be Used By Appsâ
â

â
The Setup
SSO tokens should expire after a while. That way, if someone steals an old token, itâs useless.
But what if an app doesnât check whether the token is expired?
The Experiment
Adam is offboarded from the company. His Google account is disabled, so he shouldnât be able to log in anywhere.
Jamie, however, tries to use an old token Adam had before his account was disabled.
Surprisingly⌠it still works on many applications!
The Result
â Myth Busted! Some apps donât properly check token expiration or revocation.
How to fix this?
- Audit token lifetimes regularly and enforce short expiration times.
- Make sure apps check token validity with Google every time a login happens.
- Automatically revoke tokens when an employee leaves the company.
⥠MYTH #4: âApplications Require Login Every Timeâ
â

â
The Setup
Adamâs company has a strict SSO policy. Accounts are automatically disabled when employees leave.
That should mean ex-employees canât access anything, right?
The Experiment
Adam has left the company, and Jamie has taken his laptop and deleted his Google account.
Adam, however, was logged into several company applications on his smartphone, and still receives notifications.
When following the notifications, Adam realizes he can still see all the conversations with his colleagues and the latest message from the CEO!
Why? Because the apps didnât check with Google to see if his SSO access was revoked.
The Result
â Myth Busted! Most developers donât want their users to have to login every time they open their application, thus their user sessions often outlive the authentication token by many months (if not forever when the session is set to never expire!).
How to fix this?
- Enforce session expiry rules to your third-party vendors
- Close accounts inside all applications when an employee leaves the company
- Automate as much as possible to remove human error from the equation
đľď¸ MYTH #5: âSSO Covers Every Appâ
â

â
The Setup
SSO is great⌠but only if itâs actually used.
Adamâs company uses Google SSO for most apps, but some employees have started using âunofficialâ toolsâa classic case of Shadow IT.
The Experiment
Jamie finds out that some employees are using third-party apps that arenât connected to Google SSO. These apps only require a simple email + password login.
And guess what? These logins have weak passwords and no two-factor authentication.
Jamie tries to brute-force a few logins⌠and within minutes, heâs in.
The Result
â Myth Busted! SSO only secures apps that are actually using itâShadow IT is a serious security hole.
How to fix this?
- Require all apps to go through Google SSO whenever possible.
- Identify and monitor unauthorized tools used in the company.
- Educate employees about the risks of using non-approved apps.
đ THE FINAL VERDICT: IS SSO ALWAYS SECURE?
After all these tests, whatâs the conclusion?
đ¨ MYTH BUSTED! đ¨
SSO is not automatically secureâit depends on how well itâs implemented and maintained.
đ´ The biggest risks?
- Stolen tokens can be misused if multi-factor authentication isnât enforced.
- Expired tokens might still work if apps donât properly check their validity.
- SSO doesnât cover everythingâShadow IT can introduce serious vulnerabilities.
- Human error (like failing to revoke access) can leave security holes.
đ ď¸ The Fix?
- Strong authentication methods (like security keys).
- Strict expiration and revocation policies for tokens and for account.
- Full visibility into all apps used by employees.
- Automated offboarding to remove human error.
â
đŹ Closing Thoughts
Adam leans back, taking in everything heâs learned.
Adam: âWow, I always thought SSO was a silver bullet, but it looks like it still needs a lot of security layers.â
Jamie: âExactly! SSO is like a seatbeltâit keeps you safe, but only if you actually buckle up and check for wear and tear.â
Adam: âGood thing we tested it⌠Speaking of tests, maybe itâs time to run a security check on our systems.â
Jamie: âNow thatâs an idea I can get behind.â


FAQ
All the questions you can have