Organizations Often Use Single Sign On Methods for Basic Access

The amount of security needed to access different computer resources depends on the authenticating method used. Certain systems may only require a single sign on, which is simply entering a user name and password. Most organizations use this method for allowing users to log into their company-provided computers and certain network resources, like networked printers.

Never Use Single Sign on Methods for Accessing Sensitive Corporate Data

Accessing other types of data, network resources and information should be safeguarded from using single sign on methods. Only requiring a user name and password is never a good idea for your payroll data, financials, and personal information about your employees. For sensitive data types, it is a good idea to use a second layer of authentication, using different methods. Second layer methods include using digital certificates, USB token keys, and smart cards.