Most People Have Used or Seen Single Sign on Authentication

Anyone who has ever used a computer has probably used single sign on authentication at some point. This type of authentication only requires the user to enter a user name and password to gain access to computing resources. For example, in secure networked environments, you are asked to provide this information each time you start up your computer. After entering the correct information, the computer log-on processes operate in the background, while connecting network drives and network printers.

There Are both Good and Bad Points to Using Single Sign on Authentication

Single sign on authentication has both good and bad points, which you need to consider. Users only need to remember one user name and password to gain access to their approved resources. After it is entered once, the computer remembers it and uses it to authenticate each time a new resource is accessed requiring the user name and password. However, anyone who can figure out someone else’s user name and password will also gain the access to the same resources.