Improved Security in SAML/OIDC Sign-in Redirection Flow

Improved Security in SAML/OIDC Sign-in Redirection Flow

To enhance the security of our authentication system, we’ve made a change to how SAML and OIDC sign-in redirections are handled. This update resolves a potential open redirection vulnerability and adds an extra layer of protection during the sign-in process.

What’s changing?

Previously, when an account was set up to use only SAML or OIDC for sign-in, users were automatically redirected to the configured SSO URL without any intermediate steps.

However, this behavior could be misused. If an attacker managed to configure a malicious redirect URL as part of the SSO setup and sent that sign-in link to a user, the user could be unknowingly redirected to a harmful site, even if they don’t belong to the attacker’s organization.

To prevent this, we now present users with a consent screen (shown below) before redirecting them to the SSO URL. This screen clearly displays the Sign-in URL and asks users to confirm that they trust the site before proceeding.


NotesNote: You may see this consent screen when signing in through a direct link or from a site that is not part of your organization’s trusted domains. This is a security measure to help verify the origin of your sign-in attempts. If you're unsure about the URL displayed, please contact your administrator before proceeding.
If you have any questions or concerns, feel free to reach out to us at support@zohoaccounts.com
    • Sticky Posts

    • Deprecation of SMS-based multi-factor authentication (MFA) mode

      Overview of SMS-based OTP MFA mode The SMS-based OTP MFA method involves the delivery of a one-time password to a user's mobile phone via SMS. The user receives the OTP on their mobile phone and enters it to sign into their account. SMS-based OTPs offer