top of page

Strengthening Login Security Through Mandatory 2FA

Authentication and login experience across multiple SaaS products

WhatsApp Image 2025-10-29 at 16.59.22.jpeg

My Role

Leading UX Designer

Team Meeting

Team

Product Manager, Architect, Developers, UX Manager, Information Development,

one white paper airplane  on a medium blue solid background.jpg

Status

In development

Glossary

SSO

Single-Sign-On

2FA

Two-factor authentication

MFA

Multi-factor authentication

The Problem

While reviewing our login experience, I discovered that users were able to disable their 2FA. This was a significant security risk, but the issue was deeper than that.

Through service blueprinting and flow audits, I uncovered how this vulnerability was being used in practice:

  • Partners with admin privileges would disable 2FA for their customers to troubleshoot login issues.

  • This created a scenario where users could access products without multi-factor authentication, reducing security and increasing exposure risk.

  • The underlying cause was ongoing login friction across different products, each built on varying legacy code.

​

This problem impacted:

  • Security posture of the platform

  • User trust

  • Support load on partners and internal teams

Hypothesis

By removing the ability to disable 2FA, we would:

  1. Strengthen overall account security.

  2. Encourage addressing the real cause of login failures instead of bypassing them.

  3. Reduce risky workaround behaviours.

Discovery & Research

I conducted a service-level discovery, mapping the current ecosystem of authentication and recovery:

  • Service blueprint of end-to-end login flows, authentication and recovery paths, and enable/disable 2FA flows.

  • Analysis of 3 months of login-related support issues.

  • Competitor flow audits (Miro, Atlassian, Google, Microsoft).

  • Multiple discovery workshops with PM, architects, developers, and stakeholders.

  • Wireflows and user story development.

Visual representation of service blueprint for authentication methods
Visual representation of project kickoff for two-factor authentication project
Visual illustration of competitive analisis done during disabling two-factor authentication project

Key Complexity

Because our products are built on different legacy codebases, it was impossible to guarantee that disabling 2FA could be blocked consistently across all product entry points. We agreed to create an error message for those instances where user was able to see the action.

Error message for users trying to disable their 2FA

Final solution

I collaborated closely with our Information Developer to introduce a clear, informative error message that triggers whenever someone finds a workaround to disable 2FA from any product surface. This ensured consistency even without a fully unified platform.

User with enabled 2FA

No change to the flow. The option to disable is now removed.

User with disabled 2FA

Required to set up 2FA at next login, with clear messaging

If a user attempts to skip setup, they are informed that 2FA is now mandatory.

I collaborated with the Information Developer to refine copy, ensuring clarity and reducing confusion during setup.

The flows went through multiple iterations based on feedback from:

  • Staff and Senior Designers

  • Engineering teams

  • Architect & PM

Delivery

  • Delivered annotated flows and states.

  • Provided messaging and interaction copy to the Information Developer.

  • Supported cross-team understanding of flow changes.

Figma handover of Disable 2FA improvements

Status & Outcome

Before release, however, a challenge emerged:

  • A Pendo login banner was deployed to announce the change.

  • The message was shown to all SSO users, including on-prem users who view their product as separate, leading to confusion and frustration.

  • This release was not consulted with UX, and I discovered it after the fact.

I worked with a colleague to:

  • Limit the message to exclude on-prem users (technical constraints prevented targeting only users with 2FA disabled).

  • Recommend updated messaging with clearer, precise copy through our Information Dev team.​

Key learnings

  • Cross-team alignment is critical when communicating authentication changes.

  • Messaging must be targeted, not broadcast.

  • Early UX involvement prevents confusion and avoids negative emotional responses at login.

Is there more you would like to see?

bottom of page