SSO Pen Tests’ Major Vulnerabilities

These days, more and more companies use single sign-on or SSO to manage access to their services and applications. This way, they delegate the authentication or authorization process to a trusted third party, allowing users to sign in to different services with the same access data. It’s true that SSO rescues users from the hassle […]