Limited control of authentication processes can leave organizations open to security risks.
When users access numerous cloud and on-premises applications, they need to enter a separate set of credentials for every application or group of applications. Some groups are integrated through Active Directory, or Google, or another identity provider, and some require individual credentials.
With so many credentials to remember, it’s easy for users to lapse into bad habits, such as making a note of passwords or reusing the same password for many applications.
Both are common approaches. Both introduce security risks.