Summary

Discovery

Building MVP

Next Steps

Impact

Learnings

Lumeto

Two-Factor Authentication (2FA)

I led product design process in a 3-month project to implement two-factor authentication

(2FA) on Contractbook. The goal was to enhance user security without sacrificing UX. To

achieve this, we chose email 2FA for a faster implementation and quicker value delivery to

users.

Key results

Enabled 2FA for all the

Contractbook's users

2FA health ratio reached 75%

Closed the gap to

Contractbook's competitors

Role & Timeline

Product Designer & Researcher

July 2022 - September 2022

Methods

User Research / User

Journey Mapping /

Competitive Analysis /

Design Audit / Visual

design / Prototyping /

Testing

The Challenge

I was part of a crucial team tasked with closing the gap between our competition and us

for Contractbook, a cloud-based contract lifecycle management software for small to

medium-sized businesses. As the Product Designer, I led the product design process for

adding a two-factor authentication (2FA) feature to the platform. Our challenge was to

enhance security while improving user experience and reducing friction during the login

process.

Final results

Defining the Problem

User Testing

As a Product Designer, I implemented Two-Factor Authentication (2FA) for our platform.

To understand users' needs for 2FA, I analyzed HubSpot service tickets and found few

mentioned not adopting Contractbook due to a lack of 2FA and security regulations. To

gather more data, I sought ways to understand user needs.

User Testing

User Interviews

We used Pendo to recruit current Contractbook customers for interviews about their 2FA

experience. After users clicked 'interested' on the modal, I sent them a screening email to

confirm if they were a good fit for an interview.

Example screening questions:

Does your company have a security policy related to 2FA?

Which method of 2FA is your company using the most? Have you had any problems

with it?

Then, I conducted problem discovery interviews with the users who passed the screening

to learn about their experience with 2FA, identify potential opportunities, and learn about

their compliance requirements.

Identified opportunities:

Users believe that "anything is better than nothing" when it comes to 2FA.

The authenticator app is the most preferred method, but users don't mind using any

other method.

Notes and scripts for user interviews in Notion

Past Interviews

I conducted a competitive analysis to identify commonalities among competitors and

gather valuable insights for building our product. This research allowed us to differentiate

ourselves and provided a basis for product development.

Notes in FigJam from competitive analysis session

User Journey Mapping

After gathering the initial insights, I led a User Journey Mapping workshop with my team

of seven to identify persona, goals, scenarios, and steps for users logging in with 2FA.

The workshop helped visualize the process.

Drag to explore – N+1 User Journey Map in FigJam

drag me!

The outcome of the workshops was opportunities, which helped to identify how the user

experience could be optimized. As well as the insights about

"What needs to be done?

What are the biggest opportunities? How are we going to measure the success?"

The

workshop was not only important for developing the product, but also benefited the team

in having conversations and aligning the team's mental model.

Live actor training

The shared vision from the mapping session helped communicate and understand users

and became the basis for decision-making. Understanding user needs was critical in

informing the design and creating a clear plan for our MVP.

Old vs new scope

Production schedule

I created a visual user flow to align with the team on feature functionality before designing

the interface. This also contributes to a smoother navigation experience, helping users

accomplish tasks efficiently.

drag me!

Production and development process workshop

Voice Recording

As a Product Designer, I implemented Two-Factor Authentication (2FA) for our platform.

To understand users' needs for 2FA, I analyzed HubSpot service tickets and found few

mentioned not adopting Contractbook due to a lack of 2FA and security regulations. To

gather more data, I sought ways to understand user needs.

Voice recording studio

Mocap recording

As a Product Designer, I implemented Two-Factor Authentication (2FA) for our platform.

To understand users' needs for 2FA, I analyzed HubSpot service tickets and found few

mentioned not adopting Contractbook due to a lack of 2FA and security regulations. To

gather more data, I sought ways to understand user needs.

Mocap studio

Development

With all the necessary foundations, knowledge, and preparation in place, I began to

design the interface for 2FA. We prioritized email 2FA as it's widely used, faster to

implement, and all users have verified email on our platform. The design aimed to add

security without compromising efficiency and prioritize user-centricity, along with easy

error recognition, diagnosis, and recovery.

Re-prioritization

As a Product Designer, I implemented Two-Factor Authentication (2FA) for our platform.

To understand users' needs for 2FA, I analyzed HubSpot service tickets and found few

mentioned not adopting Contractbook due to a lack of 2FA and security regulations. To

gather more data, I sought ways to understand user needs.

Workshop with team to identify highest impact features

Design considerations

As a Product Designer, I implemented Two-Factor Authentication (2FA) for our platform.

To understand users' needs for 2FA, I analyzed HubSpot service tickets and found few

mentioned not adopting Contractbook due to a lack of 2FA and security regulations. To

gather more data, I sought ways to understand user needs.

Workshop with team to identify highest impact features

The MVP

With all the necessary foundations, knowledge, and preparation in place, I began to

design the interface for 2FA. We prioritized email 2FA as it's widely used, faster to

implement, and all users have verified email on our platform. The design aimed to add

security without compromising efficiency and prioritize user-centricity, along with easy

error recognition, diagnosis, and recovery.

Interactive prototype in Figma (you can press "R" to refresh the prototype)

click me!

Log in screen

To inform users of the necessary action, I used the header "Check Your Email for the

Code". Additionally, I provided contact information as a solution for users who encounter

difficulties logging in.

Log in screen interface design in Figma

Receive and enter verification code

To prevent email stacking and help users quickly recognize the email with the verification

code, I included the Time-based one-time password (TOTP) code in the email header.

Additionally, I enlarged the verification code in the email body to make it easier for users

to find. However, due to technical limitations, we had to postpone the implementation of a

copy function for the code in email for a future iteration.

Receive and enter verification code interface design in Figma

Resend code

To assist users with expired codes or email delivery issues, we added a "Resend

Verification Code" button. Clicking this button triggers a new verification code to be sent

to the user's email, providing a simple and efficient solution.

Resend code interface design in Figma

Error diagnosis

To ensure users easily recognize errors, I used traditional error-message visuals and

simple language to explain what went wrong, avoiding jargon. When clicking on the

support email, it prefills the subject line for quick issue recognition and resolution.

Error diagnosis interface design in Figma

Product Launch

After designing the interface for 2FA, my PM and I decided to divide our feature release

into two phases: a Sample Rollout to a smaller group of users, followed by a General

Availability launch to all Contractbook users. This approach allowed us to gather feedback

and address any issues before releasing the feature to all users, ensuring the success of

our MVP and delivering business value quickly.

Launch planning

Impact

After the General Availability launch of 2FA, we utilized Hotjar recordings and Metabase

data to track and address any usability issues, ensuring the achievement of our business

goal. With a 2FA health ratio of 75%, we were able to calculate the number of 2FA codes

required to log in to Contractbook's platform. Users who require more codes have shared

accounts, which make it more challenging to receive the code in their email. Overall, the

project was a success.

left: Marketing materials for feature announcement; right: feature announcement on app.contractbook.com/home

Post-Launch

After the General Availability launch of 2FA, we utilized Hotjar recordings and Metabase

data to track and address any usability issues, ensuring the achievement of our business

goal. With a 2FA health ratio of 75%, we were able to calculate the number of 2FA codes

required to log in to Contractbook's platform. Users who require more codes have shared

accounts, which make it more challenging to receive the code in their email. Overall, the

project was a success.

left: Marketing materials for feature announcement; right: feature announcement on app.contractbook.com/home

Master Instructor Course

To ensure users easily recognize errors, I used traditional error-message visuals and

simple language to explain what went wrong, avoiding jargon. When clicking on the

support email, it prefills the subject line for quick issue recognition and resolution.

Error diagnosis interface design in Figma

Pilot Study

To ensure users easily recognize errors, I used traditional error-message visuals and

simple language to explain what went wrong, avoiding jargon. When clicking on the

support email, it prefills the subject line for quick issue recognition and resolution.

Error diagnosis interface design in Figma

Next Steps

Looking ahead, we also continued to think about ways to improve the user experience,

such as adding additional 2FA options e.g., an authenticator app or SMS.

Reflection & learnings

The main challenge for this project was debating and discussing 'which 2FA method is the

best?' As the sole designer, I kept an open mind but had to prioritize features that could

deliver value and impact for both the user and company within the given timeframe.

The biggest lesson learned was the importance of a User Journey Map. It uncovers

problematic and opportunistic points early on, providing a basis and visual aid for

effective collaboration among all stakeholders throughout the process.