Learning Library

← Back to Library

Solving Password Overload with SSO

Key Points

  • Most users end up with hundreds of unique, strong passwords they can’t realistically remember, leading to insecure shortcuts like sticky‑note “PC sunflower” displays, plaintext files, or reusing the same password everywhere.
  • These insecure practices expose organizations to serious risk because a single compromised password can grant attackers access to multiple systems.
  • A better solution is a Single Sign‑On (SSO) manager that stores each system’s unique credential and authenticates the user with one strong master password.
  • SSO improves usability by reducing the password burden to a single credential, but it also introduces new security considerations that must be carefully addressed.

Full Transcript

# Solving Password Overload with SSO **Source:** [https://www.youtube.com/watch?v=Bv6NZlqqn48](https://www.youtube.com/watch?v=Bv6NZlqqn48) **Duration:** 00:06:14 ## Summary - Most users end up with hundreds of unique, strong passwords they can’t realistically remember, leading to insecure shortcuts like sticky‑note “PC sunflower” displays, plaintext files, or reusing the same password everywhere. - These insecure practices expose organizations to serious risk because a single compromised password can grant attackers access to multiple systems. - A better solution is a Single Sign‑On (SSO) manager that stores each system’s unique credential and authenticates the user with one strong master password. - SSO improves usability by reducing the password burden to a single credential, but it also introduces new security considerations that must be carefully addressed. ## Sections - [00:00:00](https://www.youtube.com/watch?v=Bv6NZlqqn48&t=0s) **The Password Overload Problem** - The speaker describes the chaos of managing dozens of strong passwords, critiques insecure workarounds like sticky notes, spreadsheets, and password reuse, and hints at the need for a safer solution such as a password manager. - [00:03:08](https://www.youtube.com/watch?v=Bv6NZlqqn48&t=188s) **Debunking the Single-Point-of-Failure Myth** - The speaker argues that using a single entry point protected by unique passwords per system and multi‑factor authentication reduces risk, contrary to the claim that it creates a vulnerable single point of failure. ## Full Transcript
0:00How many passwords do you have? 0:02Ten, 20, 100? 0:04Well, if you're like me, I've got 750 unique passwords, strongly chosen, 0:10and thankfully, I don't have to remember most of them. 0:12I'll let you in on the secret. 0:14So how do most people solve that problem? 0:17It's a problem that was created by the security department who had good intentions of making 0:22you choose strong passwords. 0:24But strong passwords are generally hard to remember. 0:27So what we end up with is this thing that has been referred to as "PC sunflower". 0:32It looks like this. 0:33It's a display monitor with a lot of little yellow stickies all around it, each one of 0:39them with the user ID and password. 0:41Obviously, not a very secure solution. 0:43What is a potentially other alternative that people do? 0:47Sometimes they take all those passwords, don't put them on the monitor on the little yellow stickies. 0:51Instead, they put them in an insecure file like, say, a flat file, an Excel spreadsheet, 0:57or even an email to themself. 0:58Also, not a good solution. 1:01Or, the third alternative most users choose with-- left to their own devices is --is they 1:06set all the passwords to the same thing. 1:08Which again, not a good choice because if you are able to figure out the password on 1:12one system, you get it on all. 1:15The whole thing falls like a house of cards. 1:18So, what are the alternatives? 1:20Well, let's look at why we have this problem in the first place. 1:23So we've got a user here who needs to log in to, let's say, a number of different systems 1:30down here. 1:32So this is system 1, system 2, system N. 1:35Now, this user needs to log in, so they're having to log in here with password 1. 1:43They log in here with password 2. 1:46They log in here with password N. 1:49And the guy is up here with this issue because he can't remember all of these passwords. 1:55So that's why he went with those other solutions that I was talking about, which are not secure. 2:00They're not getting us to where we want to be. 2:03And the user has this conundrum of trying to figure out how they can solve the problem. 2:08Now, what's a better alternative? 2:10Well, let's put that user over here, and this time we'll have him log in to his multiple 2:18systems --system 1, 2 and N. Except in this case, he's going to not log directly 2:25into the system, he's going to log into a thing I'm going to call a single sign-on manager. 2:31This is a special tool, software usually, that's designed so that you log into this 2:37with a single password that you've chosen that's complex, and then it remembers the 2:43passwords for all of these other systems. 2:46So we have a unique password for each one of these systems. 2:50So this would be password 1-- actually, this would be password A --to get you into 2:54the single sign on. 2:56This is password 2 and this is password N. So now we have a case where the user has 3:01to keep up with only one password, which is good news for that user. 3:08Now they feel this way. 3:10One password to get into all of the systems. 3:12So that makes their user experience much better. 3:15Now, what's the problem with this? 3:17Some people would argue-- security types often do this --that now you've introduced a single 3:23point of failure (SPoF). 3:25In other words, if someone figures out this password, they can log in here and therefore 3:29get access to all the others. 3:31Well, I'm going to say, first of all, to the people that expressed this objection, have 3:36you ever met one of these guys? 3:38Do you know how they're solving their problem? 3:40Remember what I told you? 3:41They're putting them in insecure places. 3:43Or, if they're not doing that, they're setting password 1 to password 2 to password N. 3:52They're choosing a single password for everything anyway. 3:55So, it's the same problem. 3:58The difference is, if it's the same password in this scenario, then knowing the password 4:03here means you know the password here and here-- and they all fall. 4:07In this case, if someone knows the password here because they were able to hack that system, 4:13they do not know what these passwords are because they're unique. 4:17So what that does for us is lessens the attack surface to a single system at a time. 4:25And if you say "But how do I protect this?" 4:27Now we're going to do that with multi-factor authentication. 4:31With this now, it's not a single password that gets you in, it's also something you 4:35have or something you know or something you are. 4:39It's some combination of those things. 4:41So now I have a secure gateway into this system, and there it unlocks all the rest. 4:47So with a solution-- with single sign-on --we end up with some distinct benefits. 4:54One of those is we end up with better security. 4:58Better security for the reasons I just talked about. 5:00That is, we don't have one system falls and they all fall. 5:05Now we have one system falls and that's the extent of the damage. 5:09We have a better savings, cost-wise. 5:11Why is that? 5:12Well, it turns out if a user has only one password to remember, they're much more likely 5:17to remember it, therefore not forget it, 5:20therefore not need to call into the help desk in order to get it reset. 5:24And the statistics tell us that the number one call to most help desk is "reset my password". 5:29Sometimes is as much as 50% of the calls into the helpdesk. 5:33That means half of your helpdesk calls is just supporting the password reset problem. 5:39We can lessen if we used a single sign-on solution. 5:42And then at the end of the day, we also get an improved user experience. 5:47This user has only one thing to remember. 5:50Therefore, they don't need the PC sunflower. 5:52They don't need the Excel side file. 5:54They don't need to set all their passwords to the same thing and compromise security. 5:58So this is one of these rare situations that we need to jump on because we actually get 6:02to improve security, lower cost, and improve the user experience. 6:07Thanks for watching. 6:08Please remember to Like this video and Subscribe to this channel so we can continue to bring 6:12you content that matters to you.