Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1066

Social Login

What is Social Login?

Social LoginAn authentication pattern where users sign into a third-party site using their existing identity from Google, Apple, Microsoft, Facebook, GitHub, or similar providers.


Social login lets a relying party delegate authentication to a large consumer identity provider, typically over OpenID Connect or OAuth 2.0. The user clicks 'Continue with Google' (or Apple, Microsoft, Facebook, GitHub, LinkedIn, Twitter/X), authenticates at the provider, and the relying party receives an ID token plus profile claims it trusts. The pattern shortens sign-up, leverages the provider's MFA, and reduces password storage liability for the relying party. Risks include over-broad scopes, account-takeover at the IdP cascading to every linked app, and 'orphan' accounts when a user loses access to the IdP. Best practice combines OpenID Connect with PKCE, minimal scopes, and a fallback authentication factor — for example, Sign in with Apple requires hiding email relays.

Examples

  1. 01

    A SaaS sign-up page offering 'Continue with Google' and 'Continue with GitHub' via OpenID Connect.

  2. 02

    An e-commerce site accepting Apple's hide-my-email relay address as the user's primary contact.

Frequently asked questions

What is Social Login?

An authentication pattern where users sign into a third-party site using their existing identity from Google, Apple, Microsoft, Facebook, GitHub, or similar providers. It belongs to the Identity & Access category of cybersecurity.

What does Social Login mean?

An authentication pattern where users sign into a third-party site using their existing identity from Google, Apple, Microsoft, Facebook, GitHub, or similar providers.

How does Social Login work?

Social login lets a relying party delegate authentication to a large consumer identity provider, typically over OpenID Connect or OAuth 2.0. The user clicks 'Continue with Google' (or Apple, Microsoft, Facebook, GitHub, LinkedIn, Twitter/X), authenticates at the provider, and the relying party receives an ID token plus profile claims it trusts. The pattern shortens sign-up, leverages the provider's MFA, and reduces password storage liability for the relying party. Risks include over-broad scopes, account-takeover at the IdP cascading to every linked app, and 'orphan' accounts when a user loses access to the IdP. Best practice combines OpenID Connect with PKCE, minimal scopes, and a fallback authentication factor — for example, Sign in with Apple requires hiding email relays.

How do you defend against Social Login?

Defences for Social Login typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Social Login?

Common alternative names include: Federated login, Login with Google, Sign in with Apple.

Related terms