Precursor Security
Identity Security | Entra ID, Okta & Google Workspace

SSO Security Assessment

Most SSO configurations are reviewed once at deployment, then never again. Contractors move on. Conditional Access policies accumulate exceptions. Legacy authentication persists. We provide the systematic, adversarial review your team cannot objectively conduct on infrastructure they built, and produce CREST-accredited evidence your auditors will accept.

From £3,750 Fixed Price
CREST Accredited
Read-Only Access Only
Zero Downtime
Re-Test Included
Scroll
The Pentest Gap

Why your pen test did not test your SSO.

Standard penetration tests treat SSO as a black box. They test the login form, not the protocols behind it. Golden SAML, PKCE downgrade, and Conditional Access logic gaps require specialist methodology.

Standard Penetration Test
Tests the login form, not the protocol
Cannot detect SAML signature wrapping or Golden SAML
Does not review Conditional Access policy logic
No IdP tenant configuration audit
SSO Security Assessment
SAML signature wrapping, Golden SAML, XXE injection
OAuth PKCE downgrade, redirect URI manipulation, scope escalation
Conditional Access policy logic review with exclusion audit
Read-only IdP tenant audit: Entra ID, Okta, Auth0, PingIdentity
Identity Security Business Case

Identity Risk Profile

Identity is now the primary attack vector. The cost of an SSO assessment is a fraction of the cost of the breach it prevents.

High Risk
83%

Identity at the Root

Of breaches involve compromised credentials used against improperly configured SSO or MFA bypass mechanisms.

Blast Radius
47apps

Average Federated Estate

Average number of SaaS applications federated to a single enterprise IdP. Every SSO misconfiguration creates exposure across your entire application estate.

Fixed Price
£3.75K

Assessment Starting Price

Full SSO security assessment with Golden SAML testing, Conditional Access review, and remediation roadmap. Less than one day of incident response.

Mapped
Controls
ISO 27001A.5.15 / A.8.5
PCI DSS 4.0Req 8
Cyber EssentialsPlus
NHSDSPT
Common Triggers

Who Commissions an SSO Assessment?

SSO security assessments are typically triggered by one of these six scenarios. If any of these apply, you are in the right place.

Compliance or Audit Gap

Your ISO 27001, PCI DSS, or cyber insurance renewal has specifically asked for evidence that SSO and identity controls have been independently reviewed. Your annual pen test did not cover it.

Configuration Confidence Crisis

SSO was deployed 12-18 months ago by a contractor or MSP. The configuration has never been independently reviewed. Conditional Access policies have exclusions no one fully understands.

Customer Due Diligence

A bank, public sector client, or enterprise customer is demanding independent security assessment of your OAuth 2.0 or SAML implementation before contract renewal. The deadline is real.

Post-Breach Identity Review

A recent incident involved compromised credentials, OAuth consent grant abuse, or MFA bypass. The board wants proof that the identity layer has been hardened and independently verified.

MFA Bypass Concern

You suspect legacy authentication protocols, stale Conditional Access exclusions, or service accounts are creating MFA bypass paths. You need an independent assessment to confirm.

M&A or IdP Migration

You are migrating from ADFS to Entra ID, merging tenants after an acquisition, or consolidating identity providers. You need assurance the new configuration is secure before cutover.

Real Findings

SSO Vulnerabilities Scanners Cannot Find

Anonymised examples from recent SSO security assessments. These are protocol-level vulnerabilities in SAML, OAuth 2.0, and OpenID Connect implementations that require manual testing to identify and exploit.

Critical
SAML

XML Signature Wrapping Bypass

The Service Provider validates the XML signature but processes a different, unsigned assertion injected alongside it. We relocate the signed element and inject a forged assertion that the SP accepts as authenticated.

Business ImpactFull identity forgery: authenticate as any user including administrators
Critical
OAuth 2.0

Redirect URI Manipulation Leading to Token Theft

The authorisation server accepts wildcard or subdirectory redirect URIs, allowing an attacker to register a URI under their control and intercept the authorisation code during the OAuth flow.

Business ImpactAuthorisation code interception grants attacker access to victim sessions
High
SAML

SAML Assertion Replay Accepted

The Service Provider does not enforce one-time use on SAML assertions. A captured assertion can be replayed minutes or hours later from a different IP to establish a new authenticated session.

Business ImpactSession hijacking from a single intercepted network request
High
OAuth 2.0

PKCE Downgrade to Implicit Flow

The authorisation server accepts requests without a code_challenge parameter on endpoints that should enforce PKCE, allowing an attacker to downgrade to implicit flow and capture tokens from the URL fragment.

Business ImpactAccess token exposure in browser history, Referer headers, and proxy logs
High
OIDC

JWT Algorithm Confusion (alg:none)

The application accepts ID tokens with the algorithm header set to "none" or accepts HMAC-signed tokens using the RSA public key as the HMAC secret, bypassing signature verification entirely.

Business ImpactForged identity tokens accepted as valid, granting arbitrary account access
Medium
Session

SSO Session Not Terminated on Logout

Logging out of the application destroys the local session but does not trigger Single Logout (SLO) at the IdP. The SSO session remains active, and re-visiting the application silently re-authenticates the user.

Business ImpactPersistent access on shared devices after the user believes they have logged out
Methodology

SSO Assessment Methodology:
Protocol-Level Testing

We go beyond automated configuration scanning. Our consultants manually trace Conditional Access policy logic, simulate Golden SAML attacks, and audit OAuth consent grants, finding the misconfigurations that tools miss and that generalist penetration tests do not cover.

OAuth 2.0

OAuth 2.0 & OIDC Flow Analysis

Testing authorisation code flows for redirect URI manipulation, authorisation code interception, PKCE downgrade attacks, and scope escalation. We also test implicit flow deprecation enforcement, token leakage via Referer headers, and OIDC token validation failures, including alg:none substitution and missing audience checks.

SAML 2.0

SAML XML Security

Testing SAML implementations for XML Signature Wrapping (including comment injection variants), XXE injection, assertion replay, signature stripping, and Golden SAML attacks targeting ADFS token signing. We decode and manipulate live SAML assertions using protocol-specific tooling to verify that every assertion is correctly signed, encrypted, and validated.

Token Lifecycle

Token Storage & Lifecycle

Analysing how Access, Refresh, and ID tokens are stored (cookies vs localStorage) and validated. We verify token expiration enforcement, rotation policies, and revocation mechanisms, testing whether tokens remain valid after logout and whether refresh token rotation is enforced.

IdP Config

Identity Provider Configuration

Read-only audit of your IdP tenant: Entra ID, Okta, Auth0, or PingIdentity. We review Conditional Access policies for gaps, identify excessive Global Admin and Privileged Role assignments, check whether legacy authentication protocols remain enabled, and audit app registrations for over-broad API permissions.

Social Login

Social Login Integration

Testing trust relationships and account linkage logic for social authentication (Sign in with Google, Apple, Microsoft). We attempt to hijack accounts via email address spoofing, test whether the application correctly validates the IdP assertion before creating or linking an account, and verify that social login cannot bypass MFA requirements.

Conditional Access

Conditional Access Policy Review

We map every Conditional Access policy, including inclusions, exclusions, conditions, and grant controls, to identify logic gaps that allow unintended access. Common findings include exclusion groups that have been silently depopulated, Basic Auth bypass for service accounts, and sign-in risk policies stuck in report-only mode.

Engagement Pipeline

How Our SSO Assessment Works

Passive configuration review. No write access, no downtime risk. Read-only audit with adversarial protocol testing.

Step 01

Architecture Review

A 30-minute scoping call followed by a review of your authentication architecture and IdP configuration diagrams. We establish which protocols are in use (SAML 2.0, OAuth 2.0, OIDC), how many integrations are in scope, and whether IdP tenant audit access is required.

Step 02

Configuration Audit

We request read-only Global Reader or Security Reader access to your IdP tenant. No write access, no administrator privileges, no production credentials. We audit app registrations, Conditional Access policies, admin role assignments, and legacy authentication settings.

Step 03

Dynamic Protocol Testing

Intercepting and manipulating live authentication traffic. We attempt redirect URI manipulation to intercept authorisation codes, PKCE downgrade to force implicit flow, SAML XML signature wrapping to forge assertions, and token replay using captured session tokens.

Step 04

Reporting & Hardening

We deliver a prioritised remediation roadmap mapping every finding to CVSS severity, compliance framework reference, and admin portal click-path instructions so your team can begin remediation on day one. A re-test is included to verify remediation of critical and high findings.

Deliverables

What You Get

Every SSO security assessment includes the following deliverables, structured for auditor review, board presentation, and compliance evidence submission.

Executive summary suitable for board, CISO, and cyber insurance submission
Technical findings organised by protocol (SAML, OAuth, OIDC) and IdP configuration
CVSS v3.1 severity-rated findings with CVE and OWASP mapping
Conditional Access policy logic map with identified gaps and exclusion audit
IdP-specific remediation guidance with admin portal click-path instructions
Compliance framework mapping (ISO 27001, PCI DSS, Cyber Essentials Plus, DSPT)
OAuth consent grant audit with over-permissioned application inventory
Free retesting within the assessment window to validate fixes.

Reports are delivered via our real-time penetration testing portal with role-based access. Also available in PDF and DOCX formats. Assessment window re-testing included at no additional cost.

Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Ready to Secure

The best time to test your defences is now.

Join the high-growth companies relying on Precursor for continuous offensive and defensive security.

CREST Triple Accredited|Fixed Price Quotes|Free Scoping Call|UK Based Team

Frequently Asked Questions

Common questions about this service, methodologies, and deliverables.

An SSO security assessment is a specialist security review of your Single Sign-On implementation, covering the protocols (SAML 2.0, OAuth 2.0, OpenID Connect), the Identity Provider configuration, and the trust relationships between your IdP and connected applications. Because SSO acts as a master key (one compromised session grants access to every connected system) it requires dedicated testing that goes beyond what a standard web application penetration test covers. Our assessments are delivered by CREST-accredited testers with specialist expertise in identity protocols.

No. We request read-only Global Reader or Security Reader access to your IdP tenant. We never require write access, administrator privileges, or production environment credentials. All access is scoped to configuration export only and can be revoked immediately after the assessment. This means there is zero risk of accidental configuration changes during testing.

A standard penetration test treats the Identity Provider as trusted infrastructure and tests login at the surface level, typically the login form, session cookies, and basic authentication bypass. An SSO security assessment goes deeper: we intercept and manipulate live SAML assertions and OAuth token exchanges, audit your IdP tenant configuration directly (read-only access to Entra ID / Okta), and test specific protocol attack paths including SAML signature wrapping, PKCE downgrade, redirect URI manipulation, and Golden SAML. The result is a specialist report evidencing protocol-level testing, the kind a PCI DSS QSA or ISO 27001 auditor will accept as substantive coverage of your identity controls.

Single sign-on is both a security improvement and a security concentration. SSO eliminates password sprawl and enables centralised MFA enforcement, reducing overall attack surface. However, it also creates a high-value target: a misconfigured SSO implementation can give an attacker authenticated access to every federated application simultaneously. The risk is not in SSO itself but in the configuration: Conditional Access policy gaps, legacy authentication bypass, unsigned SAML assertions, and overpermissioned OAuth consent grants are the vulnerabilities that turn SSO from a security control into a liability. An independent SSO security assessment identifies precisely these misconfigurations before an attacker does.

The six most important SSO security best practices are: (1) Block legacy authentication protocols (Basic Auth, SMTP AUTH) at the Conditional Access layer, as legacy protocols bypass MFA entirely. (2) Enforce MFA for all users without exception, including service accounts and emergency access accounts. (3) Review OAuth consent grants regularly and revoke any application with Mail.Read, Files.ReadWrite, or directory access that has not been explicitly approved by an administrator. (4) Audit Conditional Access exclusion groups, as stale exclusions from IT projects commonly create persistent MFA bypass paths. (5) Enforce SAML assertion signing with SHA-256 minimum, as unsigned or weakly signed assertions are vulnerable to Golden SAML attacks. (6) Commission an independent SSO security assessment annually or after significant identity infrastructure changes.

Our SAML testing covers XML signature wrapping (including comment injection variants), XML External Entity (XXE) injection, SAML assertion replay attacks, signature stripping, assertion encryption weaknesses, and Golden SAML attacks targeting ADFS token signing certificates. We use protocol-specific tooling including SAML Raider to manipulate live assertions during dynamic testing.

Our OAuth 2.0 and OIDC testing covers: redirect URI manipulation leading to authorisation code interception, PKCE downgrade attacks (forcing implicit flow on PKCE-protected endpoints), token leakage via Referer headers and browser history, scope escalation via over-permissioned client registrations, authorisation code replay (missing state and nonce validation), and OIDC token validation failures including alg:none substitution and missing audience checks.

A Conditional Access policy review is a systematic audit of the logic governing when and how users are permitted to access your Microsoft 365 or Entra ID-protected resources. Our review maps every policy, including inclusions, exclusions, conditions, and grant controls, to identify logic gaps that allow unintended access. Common findings include: policies with exclusion groups that have been silently depopulated, legacy authentication bypass for service accounts that were excluded temporarily and never re-included, sign-in risk policies in report-only mode rather than enforcement mode, and emergency access accounts excluded from all policies without compensating monitoring controls. The review produces a prioritised list of policy changes with exact admin portal click-path instructions.

We have extensive experience auditing Microsoft Entra ID (Azure AD), Okta, Auth0 (Okta CIC), PingIdentity, and Google Workspace. We review both the tenant-level configuration and the specific application registrations. We also assess custom Identity Providers built on IdentityServer4, Keycloak, or other OpenID Connect-compliant frameworks.

Yes. Our assessment produces a structured technical report suitable for submission to a PCI DSS QSA as evidence that SSO and authentication controls within cardholder data environment scope have been independently tested. For ISO 27001, findings map to Annex A.5.15 (Access Control), Annex A.8.2 (Privileged Access Rights), and Annex A.8.5 (Secure Authentication). For Cyber Essentials Plus, the report provides evidence of MFA enforcement and access control testing. We can provide a supplementary compliance mapping document on request.

Yes. We verify that Multi-Factor Authentication is correctly enforced through Conditional Access policies and cannot be bypassed via legacy authentication protocols (Basic Auth, NTLM), device compliance exceptions, or logic flaws in the application post-SSO session handling. We specifically test whether MFA can be bypassed by replaying a session established before MFA was added to the Conditional Access policy.

Engagements typically range from 2 to 5 days depending on the number of SSO integrations in scope, the protocols in use, and whether full IdP tenant audit access is included. We provide a fixed-scope quote following a 30-minute scoping call at no charge.

Several UK compliance frameworks now explicitly require or strongly imply independent identity security testing. ISO 27001:2022 Annex A.5.15, A.8.2, and A.8.5 require organisations to demonstrate that access control measures, including SSO and MFA, have been reviewed and tested. PCI DSS v4.0 Requirement 8 mandates multi-factor authentication for all access into the cardholder data environment, with evidence of MFA enforcement review. The NHS DSPT requires evidence of access control testing under its Identity and Access Management data security standard. Cyber Essentials Plus requires technical verification of MFA controls. Our CREST-accredited assessment report is structured to provide compliance-ready evidence across all of these frameworks.