Flag

We stand with Ukraine and our team members from Ukraine. Here are ways you can help

Get exclusive access to thought-provoking articles, bonus podcast content, and cutting-edge whitepapers. Become a member of the UX Magazine community today!

Home ›› Inclusion ›› Inclusive Login Starts at the First Step

Inclusive Login Starts at the First Step

by Shannon Joycelyn
5 min read
Share this post on
Tweet
Share
Post
Share
Email
Print

Save

Most login screens were built for ideal conditions: focused, unhurried, and with perfect recall. But real life looks nothing like that. This piece explores why so many legitimate users fail at the very first step and what a more human approach to login could look like.

How often does a login fail even when someone is trying their best?

We have been spending more time thinking about inclusivity in the parts of a product that people touch most often. Login is one of them. It appears constantly, is usually justified under security requirements, and often causes momentum to break before anything else happens.

In our team, we started noticing how often the loss of momentum came from small details rather than a complete lapse in memory. Someone would feel confident they had the right password, then get blocked anyway. It might be a capital letter in the wrong place, a symbol required on one site but not another, or a password that was updated months ago and never properly stored.

Password failure is often a tiny mismatch: one letter case, one missing symbol, one forgotten update. Illustration by Shannon Joycelyn

What makes this frustrating is how quickly it escalates. A step that should take seconds turns into a longer sequence of retries, second-guessing, checking notes, and eventually deciding whether to reset. Add the pressure of a warning like “too many attempts,” and it becomes easy to slip into guessing and lockouts.

This friction shows up clearly in metrics. Many companies report login success rates between 60% and 85% under normal conditions, which means a significant portion of legitimate attempts do not succeed. Even when recovery works, it still costs attention and energy, and it often pulls people away from the task they actually came to do.

These failures happen even under relatively favorable circumstances. Logins rarely take place in a quiet, focused setting. They happen between meetings, on a commute, while juggling messages, or at the end of a long day. Glare on a screen, unstable connectivity, or using one hand can be enough to turn a recall-based login into a frustrating experience.

There is also a structural layer that does not always show up in usability testing. Many login systems assume one person controls one email and one password. That is not always how access works.

In Indonesia, email sharing is common in everyday use. Republika has reported examples of people sharing email accounts with friends and family to access apps and services. Accounts can also be set up with help from phone shops or someone at home. When login assumes private, individual credentials, it fails to reflect these realities.

What this means for older adults

For many older adults, this context is common rather than occasional. Memory can be less reliable, eyesight can change, and typing accurately on a small keyboard can take real effort. Research shows that password requirements are often designed with little consideration for age-related cognitive decline, even though remembering passwords becomes harder over time.

When login depends on precise recall, access starts to feel conditional, something that has to be re-earned each time.

Looking closer, the underlying problem is not only age. It is the accumulation of demands. Password login asks people to remember exact details and enter them accurately across many services. Studies have shown that as the number of passwords increases, forgotten and mixed-up passwords increase as well. This phenomenon is why the same login flow can feel manageable one day and unexpectedly difficult the next.

This led us to explore a different starting point.

What if login leaned more on recognition than recall?

Several alternatives to traditional passwords already exist:

  1. Pattern locks on Android devices reduce typing burden but share similar problems: simple patterns are straightforward to guess, while complex ones can be as difficult to remember as passwords.
  2. Biometric authentication using fingerprints or facial recognition can reduce friction significantly, but it requires specific hardware that not everyone has access to, particularly in markets where older or lower-cost phones are common. Biometrics also fail for people with certain disabilities, skin conditions, or injuries, and unlike passwords, you cannot change your fingerprints once compromised.
  3. PINs are easier to remember than complex passwords, but remain vulnerable when people choose obvious combinations.
When your hand shakes, your finger is wet, or you are rushing, even “simple” unlock steps can fail. Illustration by Shannon Joycelyn

Each of these methods emerged to solve real problems. Yet none fully addresses the underlying issue: when conditions are not ideal, whether from missing hardware, physical limitations, or memory constraints, people get locked out.

Password login relies almost entirely on memory. The interface offers very little support when recall fails. Recognition works differently. Rather than generating the correct answer from scratch, individuals select a familiar option from a list. That distinction matters when attention is limited or conditions are less than ideal.

Recognition-based steps reduce dependence on exact typing, case sensitivity, and special-character rules. Errors are less punishing because the interaction is about choosing rather than composing.

From there, we began exploring a recognition-based login where three images are selected during setup and later chosen again from a grid to log in. Research consistently shows that people are better at recognizing images than recalling text strings, and studies involving older adults have found lower rates of forgotten credentials with image-based techniques compared to text-based passwords.

A login concept that lets people sign in by selecting three familiar images, reducing reliance on memory and precise typing while still keeping security options in place. Illustration by Shannon Joycelyn

What changes is the mental load during the login moment. With passwords, people have to retrieve an exact string and enter it perfectly, even when attention is divided. With recognition-based login, the interface provides cues. People can select what they recognize rather than reconstructing the password from scratch.

Not a universal solution

Recognition-based login is not appropriate for every context. High-security environments like banking, healthcare systems, or enterprise applications often require multi-factor authentication and stronger verification methods. As one pathway among others, recognition-based login is particularly suited for consumer-facing products where accessibility and reduced friction are priorities, offering a way to reduce avoidable failure for people who are already working harder to complete the same task.

Designing with older adults in mind often reveals where systems rely too heavily on ideal conditions. Login tends to require focus, time, and a steady hand. Real use is messier.

This phenomenon is also the reason why we repeatedly revisited the curb-cut effect. Curb cuts were designed for wheelchair users, but they ended up helping parents with strollers, travelers with luggage, delivery workers, and anyone moving through a city with their hands full. Digital experiences often work the same way. A login path designed for older adults who struggle with recall can also help in everyday situations that teams rarely design around, like glare on a screen, one-handed use, fatigue, or returning after months away. When the front door of a product works for the most constrained moments, it usually works better for everyone.

The article originally appeared on Medium.
Featured image courtesy: Wosunan.

post authorShannon Joycelyn

Shannon Joycelyn
Shannon Joycelyn is an experienced product designer at Sixty Two. She crafts thoughtful UX strategies, explores visual ideas, and sweats the UI details because good design should work for everyone.

Tweet
Share
Post
Share
Email
Print
Ideas In Brief
  • The article examines how traditional password-based login systems fail a significant portion of legitimate users, particularly older adults and those in non-Western usage contexts, and argues for recognition-based authentication as a more inclusive alternative, drawing on the curb-cut effect to show that designing for constrained conditions ultimately improves the experience for everyone.

Related Articles

Discover why the points, badges, and streaks in your favorite apps aren’t really gamification.

Article by Montgomery Singman
Gamification 2.0. Beyond Points and Badges: Designing for Players, Not Metrics. Chapter 1: The Problem
  • The piece claims that most apps misuse gamification, copying superficial mechanics like points and badges that trick rather than motivate people, and that the experience itself is what truly drives engagement, just like good games do.
Share:Gamification 2.0. Beyond Points and Badges: Designing for Players, Not Metrics. Chapter 1: The Problem
4 min read

Learn why the real design challenge of agile is not speed but learning to design smaller, one valuable slice at a time.

Article by Paivi Salminen
Designing Small Is Harder than Designing Big
  • The article suggests that agile design is not about quick development but rather the more difficult discipline of designing smaller, resisting the temptation to map out complete systems, avoiding the snare of horizontal slicing, and inquiring into what the smallest iteration of an idea is that still provides real value to users.
Share:Designing Small Is Harder than Designing Big
5 min read

Find out how clicking “Accept All” is not really consent and how ethical UX design can return user choice to users.

Article by Tushar Deshmukh
Consent Fatigue: Are We Designing People into Compliance?
  • The article shows that consent fatigue is not a user problem but a design problem in which endless permission popups, visual manipulation, and legal-shield thinking have quietly replaced real user autonomy with engineered compliance.
Share:Consent Fatigue: Are We Designing People into Compliance?
10 min read

Join the UX Magazine community!

Stay informed with exclusive content on the intersection of UX, AI agents, and agentic automation—essential reading for future-focused professionals.

Hello!

You're officially a member of the UX Magazine Community.
We're excited to have you with us!

Thank you!

To begin viewing member content, please verify your email.

Get Paid to Test AI Products

Earn an average of $100 per test by reviewing AI-first product experiences and sharing your feedback.

    Tell us about you. Enroll in the course.

      This website uses cookies to ensure you get the best experience on our website. Check our privacy policy and