Single sign-on (SSO) is an authentication method that allows users to log in once with a single set of credentials and gain access to multiple applications without re-authenticating for each one.
‍
The problem SSO solves is credential sprawl. Without SSO, every application manages its own authentication: its own username, its own password policy, its own session management. For employees, this means dozens of credentials to manage and—predictably—password reuse across services. For IT, it means no central control point: provisioning a new employee requires touching every application individually, and deprovisioning requires the same.
‍
SSO creates a single point of authentication that all connected applications trust. An employee logs in once—typically through an identity provider like Okta, Microsoft Entra ID, or Google Workspace—and that authentication is accepted by every SAML- or OIDC-integrated application. The IdP becomes the arbiter of identity: if the IdP says the user is authenticated, the application accepts it. If the IdP account is disabled, the federated access disappears with it.
‍
At its core, SSO is a trust delegation model:
The application trusts the IdP's assertion because the two have a pre-established trust relationship, typically configured through certificate exchange. The user's actual credentials never leave the IdP.
‍
SSO governance is bounded by what's configured in the IdP. Every application an employee accesses outside SSO—through a direct login, a personal account, or a tool that doesn't support SAML or OIDC—receives no SSO governance. No centralized MFA enforcement. No IdP-based deprovisioning. No session policy.
‍
For most organizations, this gap is substantial. Shadow SaaS applications adopted independently, AI tools connected through personal Gmail accounts, legacy applications that don't support modern federation standards, free-tier tools employees signed up for before IT had an equivalent offering—none of these appear in the IdP and none benefit from SSO controls.
‍
When an employee is deprovisioned through SSO, their federated access to IdP-connected applications stops immediately. Their accounts in shadow SaaS applications remain active. Their OAuth grants to third-party tools remain valid. Their sessions in applications they accessed outside SSO continue until those sessions expire on their own terms. SSO is a necessary foundation. Treating it as a complete offboarding solution is one of the most common identity governance gaps in practice.
‍