12:21 AM

Security Snags Loom Over Social Login

Even with standards, social authenticators are hardly secure enough for enterprises

As people tie their social networking identities more closely with their in-real-life personas, the idea of cross-referencing social identity data to authenticate users on the Web and in the enterprise continues to gain steam. The Secretary of State in Washington offered a prime example of this drive earlier this month by unveiling a new voter registration Facebook app developed by Microsoft that cross-references Facebook identity data with state information to confirm potential voters are who they claim to be before entering them in the voter rolls.

But the convenience of social login and social single sign-on -- even with the aid of standards like OAuth and OpenID -- is largely offset by the security concerns inherent with bestowing nonsecurity-focused organizations with the duty of ensuring integrity of a trusted chain of authentication.

"Companies are increasingly leveraging identity data created on social media sites to conduct business transactions, as it often provides for improved efficiency and better communication with customers," says Eric Maass, CTO of Lighthouse Security Group. "But organizations that rely upon identity information provided by third parties, such as Facebook and Twitter, must balance the benefits of doing so with the security and liability risks that can result."

Unfortunately for many CISOs, the headlong rush by enterprise developers to satisfy users' demands for always-available access, particularly through mobile devices, has drowned out even the whisper of suggestions for balance.

"Users want an easy way to identify themselves on mobile devices, and social login caters to such expectations," says Francois Lascelles, chief architect at Layer 7 Technologies. "As the enterprise reaches out to target audiences through mobile applications, there is an increasing demand for controlling identities at the API level."

Meanwhile, social networking sites like Facebook are doing everything in their power to encourage adoption of their login APIs to bolster footprint and their earning potential. Good for them, but maybe not so great for security organizations, considering these sign-on constructs generally have been created with every nature of usability up the priority stack above security.

"Social single sign-on was designed with convenience in mind, not security. A good example is the world's most successful social single sign-on protocol, Facebook Connect, which was designed to allow other websites to tap into Facebook's social graph with the sole purpose of expanding Facebook's footprint," says Thomas Pedersen, CEO and founder of OneLogin. "This aim at fast user adoption and tight security are like oil and water."

[ Learn about the flaws in web services SSO. See Web Services Single Sign-On Contain Big Flaws. ]

In the case of the app created by Microsoft for Washington state voters, My Vote, Facebook Connect is not used as an authenticator, and the identity data utilized is strictly used for voter registration purposes. Voters still must prove their identities in person while voting using a driver's license.

"It's important to note that the security here is not based on Facebook Connect," Pedersen says. "Voters still have to show a valid ID in order to cast their vote. Without that level of authentication, the security risks would be significant."

The added layer of security may offer some insight into how IT organizations can use social login applications based on risk appetite and mitigating controls. So a payment app may not be appropriate, but a user forum may work well. The ideas, Maass says, is to always keep in mind the nature of the trust broker in the social login ecosystem.

"Companies that trust the fact that users are who they say they are because they can delegate authorization to a specific social media site risk overstepping the boundary of legitimate 'trust,' as social identities are hardly authoritative," he says. "Anyone can sign up for one free of charge and promote fake identifying information."

The bottom line is that social identities should exist within enterprise schemas as agents of convenience, not security, he says.

"They should not rely upon the authenticated identity or the identity data from a social profile as authoritative," he says, "or anything they'd otherwise base a sensitive transaction upon."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
8/23/2012 | 2:29:18 PM
re: Security Snags Loom Over Social Login
The thing to realize is that not all authentication is about security. Some light services with very low risk can benefit from social login's ease. And like the voting program and it's photo ID, using multi-factor authentication in conjunction with social can help raise the security while keeping much of the-convenience. There's a lot of easy ways to do that, too. You can go with a commercial product like Quest's Webthority or free options like OpenAM. They would let you accept the social login and then challenge for some second factor. What second factor would likely depend on your needs. You-could-send a pin to someone'e mobile phone/device, or maybe you can use a form of KBA.-
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
Microsoft Report Details Different Forms of Cryptominers
Kelly Sheridan, Staff Editor, Dark Reading,  3/13/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.