The released state allowed members to use either their existing username or email address for access. The timely technological advancements that allowed this approach eliminated the user's obstacle of having to remember their current state.
This iterative state was tested with 10 diverse members. Though all were able to complete email authentication, there was much confusion about what to do upon return.
The next iteration captured authentication after a legacy sign in. This solution allowed successful future access regardless of whether they preferred to sign in with an authenticated email address or their legacy username.
requirements discovery
user flow iteration
prototyping
usability testing preparations
prototype revisions
asset and instruction hand-offs
successful launch
business goals met:
optimized information security for users and employer sites
minimized call center intervention