Security considerations with SSO
SSO Connections in Stytch are scoped to a specific Organization and SSO authentication is non-transferable between Organizations. This means that an end user who authenticates via one Organization’s SSO Connection will need to perform another authentication flow in order to Session Exchange into another Organization they belong to under the same email. The reason for this restriction is that the workforce IdP can attest to whatever user identity it wants in SSO authentication, without any proof of verification. This is expected and desired when the Organization is also the owner of the workforce IdP instance, as it is the ultimate source of truth on their employees’ identities and access. However, allowing authentication into other Organizations via that SSO Connection introduces a security vulnerability; if that workforce IdP is compromised, SSO could then be used by a malicious attacker to access any other Organization’s instance by having the workforce IdP attest to emails of Members of those Organizations.Supporting multi-Organization access
While the vast majority of SSO Connections are typically only used to log into a single Organization, there are a few scenarios where you may want end users to be able to authenticate into multiple Organizations via a single SSO Connection:- Single company has multiple Organization instances, due to M&A activity or wanting to keep international subsidiaries or distinct departments separate
- Managed Service Providers (MSPs) who help maintain multiple companies’ Organization instances
Implementing External SSO Connections
Configuration
Organization admins can create External SSO Connections via the Admin Portal SSO UI Component by:- Clicking New Connection
- Selecting Add an external connection
- Inputting the ConnectionID they wish to allow and the owning OrganizationID