A better and more secure authentication experience enables better conversion and growth while keeping the bad actors out. However, the challenge of upgrading to a new authentication stack often includes establishing tangible value for both growth and security teams. Therefore, before embarking on the journey, it’s important to establish the metrics that teams should be looking for. This includes conversion metrics for good users as well as ATOs/Chargebacks. For a successful migration, it’s also important to agree on not just the end state but also the interim milestones so we can continue to deliver value throughout the process. Ideally, the migration is not an on/off switch, and it gives users a chance to gradually accept and embrace the new experience while having the old experience as a backup if things go wrong. Lastly, the authentication strategy should be considered as a whole and not in isolation with each authentication method. This includes augmenting passive authentication methods such as IP reputation and device fingerprinting. In this session, we’ll cover:
- What metrics to measure for your authentication strategy?
- What are some of the key flows to consider?
- What are some of the prerequisites and interim milestones to establish?
- What are the guidelines for the onramp to passkeys?
- How to augment active authentication with passive authentication?