Security Snags Loom Over Social Login

  /     /     /  
Publicated : 22/11/2024   Category : security


Security Snags Loom Over Social Login


Even with standards, social authenticators are hardly secure enough for enterprises



As people tie their social networking identities more closely with their in-real-life personas, the idea of cross-referencing social identity data to authenticate users on the Web and in the enterprise continues to gain steam. The Secretary of State in Washington offered a prime example of this drive earlier this month by unveiling a new voter registration Facebook app developed by Microsoft that cross-references Facebook identity data with state information to confirm potential voters are who they claim to be before entering them in the voter rolls.
But the convenience of social login and social single sign-on -- even with the aid of standards like OAuth and OpenID -- is largely offset by the security concerns inherent with bestowing nonsecurity-focused organizations with the duty of ensuring integrity of a trusted chain of authentication.
Companies are increasingly leveraging identity data created on social media sites to conduct business transactions, as it often provides for improved efficiency and better communication with customers, says Eric Maass, CTO of Lighthouse Security Group. But organizations that rely upon identity information provided by third parties, such as Facebook and Twitter, must balance the benefits of doing so with the security and liability risks that can result.
Unfortunately for many CISOs, the headlong rush by enterprise developers to satisfy users demands for always-available access, particularly through mobile devices, has drowned out even the whisper of suggestions for balance.
Users want an easy way to identify themselves on mobile devices, and social login caters to such expectations, says Francois Lascelles, chief architect at Layer 7 Technologies. As the enterprise reaches out to target audiences through mobile applications, there is an increasing demand for controlling identities at the API level.
Meanwhile, social networking sites like Facebook are doing everything in their power to encourage adoption of their login APIs to bolster footprint and their earning potential. Good for them, but maybe not so great for security organizations, considering these sign-on constructs generally have been created with every nature of usability up the priority stack above security.
Social single sign-on was designed with convenience in mind, not security. A good example is the worlds most successful social single sign-on protocol, Facebook Connect, which was designed to allow other websites to tap into Facebooks social graph with the sole purpose of expanding Facebooks footprint, says Thomas Pedersen, CEO and founder of OneLogin. This aim at fast user adoption and tight security are like oil and water.
[ Learn about the flaws in web services SSO. See
Web Services Single Sign-On Contain Big Flaws
. ]
In the case of the app created by Microsoft for Washington state voters, My Vote, Facebook Connect is not used as an authenticator, and the identity data utilized is strictly used for voter registration purposes. Voters still must prove their identities in person while voting using a drivers license.
Its important to note that the security here is not based on Facebook Connect, Pedersen says. Voters still have to show a valid ID in order to cast their vote. Without that level of authentication, the security risks would be significant.
The added layer of security may offer some insight into how IT organizations can use social login applications based on risk appetite and mitigating controls. So a payment app may not be appropriate, but a user forum may work well. The ideas, Maass says, is to always keep in mind the nature of the trust broker in the social login ecosystem.
Companies that trust the fact that users are who they say they are because they can delegate authorization to a specific social media site risk overstepping the boundary of legitimate trust, as social identities are hardly authoritative, he says. Anyone can sign up for one free of charge and promote fake identifying information.
The bottom line is that social identities should exist within enterprise schemas as agents of convenience, not security, he says.
They should not rely upon the authenticated identity or the identity data from a social profile as authoritative, he says, or anything theyd otherwise base a sensitive transaction upon.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Security Snags Loom Over Social Login