With SSO, users log on once — and get access to all applications they're authorized to use.

In modern organizations, the number of applications is increasing rapidly: collaboration tools, HR systems, customer access, supplier portals. Without central login, this quickly leads to password chaos, security risks and heavy burdens for IT.
Single sign-on (SSO) solves exactly this challenge:
Users log in with SSO unodc to — and receive Access to all applicationsfor which they are eligible.
Today, SSO is a central component of modern IT security.
Single sign-on (SSO) is an authentication method in which a user A single time Sign up and then automatic access to multiple connected apps receives — without further logins.
That means:
An everyday comparison:
Like a central master key that can open various doors — but only for people with the appropriate authorizations.
Even though SSO seems simple in everyday life, there is a clearly structured technical process behind it.
1. Authentication vs. authorization
SSO solves authentication, i.e. the secure verification of identity.
Which rights a person then receives in the connected applications, on the other hand, are controlled via roles, groups and policies in identity and access management (IAM).
2. SSO explained in 5 steps
The token is a secure “proof of access” that can be used multiple times — without re-entering a password.
3. These protocols enable modern SSO
Modern systems use open standards such as:
These protocols enable secure, interoperable authentication between platforms, clients, applications, and systems — whether cloud-based, on-premise, or hybrid.
SSO has benefits for security, IT departments, users, and compliance alike.
1. Increased safety
2. Better comfort & user experience
3. IT relief & cost savings
4. Strong compliance & auditability
Decisive, especially for authorities and regulated industries:
Not all SSO is the same — there are different requirements depending on the use case.
1. Workforce SSO (B2E)
For Employees in Companies or Public Authorities.
2. Customer SSO (B2C/CIAM)
For End Customers or Citizens
3rd Partner SSO (B2B)
For Suppliers, Service Providers, External Partners
4. Federated SSO
Organizations trust each other (e.g. SAML Federation between Companies).
A password manager stores passwords securely and automatically fills them out when required — but the actual login continues to take place decentrally in every application. Single sign-on works fundamentally differently: Here, users only log on once to the central identity provider, which verifies their identity and issues a secure token. All connected applications trust this token and therefore no longer require their own password. While password managers only make it easier to handle passwords, SSO creates uniform, verifiable and significantly more secure authentication across all systems.
An SSO system becomes particularly important when:
SSO is a safety-critical part of the IT infrastructure. For a solution to be sustainable in the long term, it should meet the following requirements:
Single sign-on reduces risks, simplifies IT, improves user experiences and creates the basis for modern, scalable strategies. In combination with strong MFA procedures, ILM processes and clear governance, SSO becomes a central component of IT security.
