Answer:
Attackers can exploit insecure single sign-on (SSO) implementations by exploiting vulnerabilities in the implementation, allowing unauthorized access to multiple services linked through SSO.
Attackers can exploit insecure single sign-on (SSO) implementations by exploiting vulnerabilities in the implementation, allowing unauthorized access to multiple services linked through SSO.
You may be interested in:
Web Security MCQs