This document discusses cloud computing and single sign-on authentication. It provides an overview of cloud service models including software as a service, platform as a service, and infrastructure as a service. It then describes how single sign-on systems work with an identity provider and relying parties, and the benefits of single sign-on in reducing password overhead. However, it also discusses the security risk of assertion consumer service spoofing attacks on single sign-on implementations. Potential mitigations like whitelisting and signing authentication requests are presented.