Auth0 Ebook Authentication After Passwords
Auth0 Ebook Authentication After Passwords
Auth0 Ebook Authentication After Passwords
Passwords
Maximizing conversions (and enhancing security)
in the age of convenience
EBOOK
auth0.com
2 Authentication After Passwords
Contents
Introduction 05
Contents
Start trusting 21
Prioritize accessibility 24
Contents
Summing Up 28
Introduction
Identity exists at the intersection of:
In fact, we believe that the companies that will succeed in the next five
years will be the ones best-equipped to meet the
ever-growing consumer expectations for these three attributes.
But what will that future look like, and by what path can today’s companies
become tomorrow’s leaders?
Historically, companies have been forced to prioritize and compromise between these priorities—but
in our view, this tension only exists because of the way infrastructure and systems have historically
been designed.
As we will see, innovative solutions can satisfy all three areas simultaneously.
Tomorrow will be different: the burden of proof will shift from the user to
the business. In this loginless paradigm, users establish trust in the lowest-
friction manner possible; once established, more contextual signals and
| © Auth0 2021
intelligence are used to maintain and increase trust, rather than requiring
the user to repeatedly sign in.
auth0.com
7 Authentication After Passwords
Alex wakes up to the alarm from their smartphone; after briefly reviewing
their personalized news feed and checking how the international markets
are performing, they head into the spare room for a morning workout.
Ready for the day, Alex opens a laptop. The integrated camera and
biometrics authenticates Alex in an instant, without any intervention; while
Alex isn’t consciously aware, this same biometric identity is the reason why
accessing online applications—both professional resources and personal
services—is so seamless. The one exception was an online doctor’s
appointment that required Alex to verbally answer a few questions posed
by a virtual assistant before being authorized to meet with the physician.
The future of the Internet will be based on trusted digital relationships, with
trust flowing in two directions:
We’ll return to the first point later, but for now let’s examine the second.
While it’s true that loginless is built upon a foundation of trust, it’s important
to understand that the trust is not blind; rather, tomorrow’s customer
identity and access management (CIAM) systems will employ a number of
technologies and approaches to deliver a secure, convenient experience. At
the core, such systems need to consider, with every user interaction:
Now that we’ve seen a glimpse of the future’s what, let’s look at the why.
| © Auth0 2021
2021, Published 25 February 2020. GARTNER is a registered trademark and service mark
of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with
permission. All rights reserved.
9 Authentication After Passwords
• Does your account creation process ask for too much information
or require too many steps to complete? You get fewer customers
signing up.
2. FICO’s 2020 Digital Banking Study [FICO] revealed that 28% of Americans reported
abandoning an online purchase because they forgot login information.
3. A study conducted jointly by MasterCard and the University of Oxford (Mobile Biometrics
in Financial Services: A Five Factor Framework) [University of Oxford] reported that,
auth0.com
“About a third of online purchases are abandoned at checkout because consumers cannot
remember their passwords.”
11 Authentication After Passwords
While the digital world has features like one-click purchasing and “same
order as last time,” the physical world has plenty of its own examples.
For instance, a hotel’s mobile app was rarely anything more than a way
to manage bookings and reward points—until Marriott and Hilton used
the app to transform a phone into both the check-in desk and room key.
Business travelers—a lucrative segment in the hospitality industry—
embraced the ability to fly by the check-in lines and appreciated that they
no longer have to deal with the annoyance that follows losing a room key.
Or consider National Car Rental’s emphasis on the “Choose any car in the
aisle and go” convenience available to Emerald Club members.
Delivering a uniquely great experience can elevate your brand above all
others, while raising customer expectations in the market as a whole and
forcing the competition to play catchup.
While friction is an inconvenience for many users, for others it can present
significant impediments that prevent them from accessing your services.
4. The same FICO study cited earlier found that fewer than 23% of Americans use a
password manager.
13 Authentication After Passwords
Viewed through this new lens, the cost of friction within identity flows
becomes much clearer. For example, an abandoned account creation might
equate to $1,000 in missed lifetime revenue, and every failed login might
cost $100 in lost sales.
Plug in your own numbers and multiply by your customer base, and you’ll
start to approximate the cost of friction to your business.
So now that the impact of friction is becoming clear, how can you
minimize it?
Figure 1: Identity flows are fundamental elements of the customer journey and strongly influence
conversion rates
EXPOSURE
DISCOVERY
CONSIDERATION / TRIAL
CONVERSION
LOYALTY
ADVOCACY
| © Auth0 2021
auth0.com
14 Authentication After Passwords
Unfortunately, too many companies view friction within identity flows as technical issues.
How do we know? Because most of our conversations with companies involve identity and security
personnel; it’s comparatively rare for finance, product management, product marketing, customer
experience, or other customer-oriented roles to be involved—and when they are, it’s a clear signal
that the company understands what’s truly at stake.
5. Our own State of Secure Identity report examines the latest threats, including credential
stuffing, injection attacks, fake account creation, MFA bypass attacks, as well as the
defensive measures available to combat these attacks.
15 Authentication After Passwords
Today ⁓5 years
But this misconception arises because the existing flow isn’t called “passwordless”—instead, it’s called
| © Auth0 2021
“reset password.”
Think about it: in the typical account recovery flow the user clicks on a “reset password” button, which
triggers an email that includes a “reset password” link. The user clicks on this link and arrives at a page
that asks them to enter a new password. After doing so, they’re logged into their account—all without
entering the original password.
auth0.com
6. Perhaps “passwordlast” would be more accurate, but we don’t see that term catching on.
16 Authentication After Passwords
30
Worse user Ok user
experience experience
Email
Voice
20
Time to complete (sec)
TOTP
SMS
Better
10 user experience
Push
WebAuthn
0
70 80 90 100
Internal study, Q4 2021 Passing Rate (%) (bubble size denotes strength of security)
Plus, there are many reasons why you should start right away—from the
immediate conversion gains, to the relative ease of incremental change now
(as compared against massive upheaval in the future), to the reality that the
trust which is so essential to the transition needs to be built up over time, to
| © Auth0 2021
the fact that different users will move at their own pace.
auth0.com
18 Authentication After Passwords
But the truth is that you can get started today on your journey to loginless—by embracing
passwordless authentication.
The first and most critical step is to change your mindset about identity
flows. Stop regarding them as some behind-the-scenes technical
component and start seeing them for what they are: make-or-break
elements of your customer journey.
While the login box didn’t become a familiar sight until GUIs emerged,
logging in with a user ID and password was established with the time
sharing systems of the 1960s and, later, the Bulletin Board Systems (BBS) in
the 1970s.
auth0.com
19 Authentication After Passwords
Since then, the user ID and password combination has been synonymous
with authentication, and passwords have remained the default challenge
embedded in login screens.
Figure 4: The password-centric login experience typically prompts for the username and
password by default
Welcome Back
Admittedly, for a while there weren’t better alternatives, but this is no longer
the case: a password is simply one way to ‘prove’ an identity—and not
nearly the best one.
Figure 5: The passwordless paradigm decouples the login flow and allows the user to choose
their preferred authentication method
Next
| © Auth0 2021
auth0.com
20 Authentication After Passwords
Companies are already realizing that their success depends upon consumer
trust and that this trust must be earned.
Additionally, as is the case with relationships in real life, trust in the digital
world is earned over time—through safe, convenient, respectful, and
delightful interactions—and consumers get to choose what information
they share, with what companies.
The burden of earning that trust now falls upon companies; those that
succeed will reap considerable rewards, while those that fail to establish
trust—or, worse, that violate it—will suffer consequences.
Two proven ways to earn trust are to show value before you ask for
something from the user and to only ask for the minimum information you
need. These approaches manifest in a few forms, including:
7. The WSO2 Open Banking Documentation site includes a resource page for
auth0.com
Identifier-first Authentication.
8. Learn more about progressive profiling in Progressive Profiling: Vital Info from
Happy Customers.
21 Authentication After Passwords
However, this thinking is rooted in the short term; long-term thinking recognizes that trust is
essential to loyal—and yes, highly profitable—relationships. Plus, there are very real short-term
benefits to trusting your customers: for example, reducing the number of fields required during
registration can dramatically increase conversions.9
Plus, there’s another reason to overcome the discomfort and start giving consumers more control:
the big players are already doing it. Companies like Apple and Facebook,10 as well as financial
institutions like Fidelity Investments11, recognize the growing importance of trust—whether to
create a competitive advantage or to address a perceived deficiency—and not only do they see the
trust-centric future, but they’re working to make it happen as quickly as possible.
Start trusting
While you may find it uncomfortable to build more trust into your customer
interactions, it’s important to note that trust exists on a spectrum—it’s not
a binary thing where you do or do not trust a user absolutely—and it is a
function of confidence and risk. In fact, it’s already possible to consider
many factors and calculate a “trust score” or “risk profile” that influences
authentication flows and the user experience. For example:
9. In an example shared by Unbounce, cutting the number of fields required from 11 to 4 led
directly to a 120% increase in conversion rate; see How To Optimize Contact Forms
For Conversions.
10. See the Facebook-sponsored video Consumers Want Control. To Compete, Your Brand
Needs to Give It to Them [Harvard Business Review].
auth0.com
11. See Financial industry to give consumers more control over their data [Akoya].
12. Learn more in Auth0 Launches Adaptive MFA to Increase Security and Reduce Friction
for End Users.
22 Authentication After Passwords
1. A false sense of security based upon the flawed premise that passwords are secure
2. A perception that anything lacking a password is intrinsically insecure
As a result, companies are understandably wary of going passwordless. Plus, the threat of brand
damage and regulatory fines stemming from breaches is enough to give any reasonable security or
product leader pause about placing too much trust in users.
In fact, the combination of their vulnerability to a number of attacks (e.g., brute force, password
spraying) and poor user habits arguably makes passwords a security liability; moreover, many other
options (e.g., MFA, OTP, magic link, push notifications, etc.) offer superior security.
Recognizing the many misconceptions around passwords is essential, because doing so changes
your perception of the risks and rewards of trust, nudging you forward.
13. Learn more in What Is Step-Up Authentication, and When Should You Use It?.
23 Authentication After Passwords
In the last few years, the FIDO Alliance has been working relentlessly
toward the vision of helping users authenticate with maximum security
and minimum friction. The resulting WebAuthn standard provides the
foundation for that to happen.
By using device biometrics for MFA, WebAuthn makes the security and
convenience of WebAuthn-powered flows available to anybody who has a
device and browser who can support the biometric challenge.15
15. Security Keys are another great WebAuthn-enabled way to secure access, but their
adoption is mostly limited to tech-savvy users or corporate environments with relatively
high-security requirements.
24 Authentication After Passwords
1. User concerns that their personal biometric data is being handed over to a business.
2. Business concerns about handling (e.g., storing, securing) biometric data.
In reality, the WebAuthn specification forces all biometric data to be contained within (and remain
within) the device. Some device manufacturers even go a step further, employing dedicated
subsystems that further segregate sensitive data.16
The result of such measures is that neither users nor businesses need to worry about privacy
concerns when it comes to biometrics.
Prioritize accessibility
When it comes to being human, we have three simple needs: to earn, to learn,
and to belong. If we can support ourselves, grow and develop our talents, and be
a part of something bigger, we’ll have a good base from which to build a
fulfilling life.
| © Auth0 2021
auth0.com
16. For example, Apple’s Secure Enclave is isolated from the main processor to provide
an extra layer of security and is designed to keep sensitive user data secure even when the
Application Processor kernel becomes compromised.
25 Authentication After Passwords
Last year, we lost physical access to many of our earning, learning, and
belonging opportunities during the pandemic. Technology had to bridge the
gap—immediately—whether organizations were ready or not. Paradigms typically
take generations to shift, but the shift to virtual work happened over
a weekend.
Organizations are taking a real and deliberate look at digital access for their
employees as well as their end users.
Hopefully it’s a mix of the best parts of life before 2020 and life now—with
technology as an empowering source of earning, learning, and belonging.
| © Auth0 2021
auth0.com
Figure 6: New MFA methods based on WebAuthn offer a great combination of strength and low
user friction, but adoption typically lags what is possible
Push
User Friction
TOTP
Recovery Code
Voice
SMS
Email
Low
19
• User awareness.
• User preferences.
• Educate about the benefits of enrolling (e.g., “WebAuthn biometric authentication is the
easiest and most secure way to protect your account”) and instructions for enrolling
In combination, these techniques will help move your users to the most convenient and most secure
authentication methods.
Summing Up
Traditional authentication is a digital barrier that suffers from many
well-known flaws:
• Most login and account creation flows put too much burden and
friction on the end user.
• Today’s most widely adopted methods are far too easy for attackers
to exploit.
• Digital relationships will be formed and will progress in the same way
they do in real life—over time.
• Consumers will choose what they share, how they get access, and
what companies they trust with their data.
However, Auth0 exists because CIAM is so complex. By building identity solutions that are easy
for developers to use, we take on that burden. Plus, moving to passwordless isn’t an all-or-nothing
endeavor; rather, incremental adjustments can be made, right now.
With a disciplined approach and the right IAM partner, there’s no reason why you can’t become a
passwordless leader. Auth0 can help your development team get started and quickly gain some
passwordless wins.
Auth0 takes on the burden of identity and access management, so you can
focus effort and energy on delivering core business value.
Contact Sales →
| © Auth0 2021
auth0.com
Auth0 provides a platform to authenticate, authorize,
and secure access for applications, devices, and
users. Security and development teams rely on Auth0’s
simplicity, extensibility, and expertise to make identity
work for everyone. Safeguarding more than 4.5
billion login transactions each month, Auth0 secures
identities so innovators can innovate, and empowers
global enterprises to deliver trusted, superior digital
experiences to their customers around the world.
All rights reserved. This eBook or any portion thereof may not be reproduced or
used in any manner whatsoever without the express written permission of the
publisher except for the use of brief quotations.