Balancing security with usability

01. Overview

Within the Enterprise Identity Access Management System, I led an eight-week UX uplift focused on improving how MFA communicates, guides, and recovers. The system itself was technically sound, but the experience introduced unnecessary cognitive load, forcing users to interpret inconsistent language, navigate unclear flows, and recover from errors with little to no support.

Client

Department of Health, Disability & Ageing (DHDA)

/

Duration

2 months

/

Year

2025

/

Role

UI/UX Designer

Welcome to MFA Setup

Pick a method that works best for you.

Use an app

Get a one-time passcode from any authenticator app

Secure

Set up

Face, fingerprint or PIN

Use your device to sign in faster with a passkey

Secure

Set up

Physical security key

Use a physical key you plug in to verify your identity

Very Secure

Set up

The more secure face and fingerprint login

Passkeys are encrypted digital keys you create using face, fingerprint or PIN. They can't be guessed or reused.

Choose where you’d like to create your passkey

Use this Windows device

Create a passkey secured with Windows Hello

Set up

Use another device

Create a passkey stored in your preferred device

Set up

Link app

Verify

Backup

You’re almost done. Let’s add a backup to avoid being locked out.

Emergency recovery codes for Authentication app

1

2

3

4

5

TbvIWgF8v3

nKEhCNPcNR

v1DAG6sCX6

11P4hBLXA1

1xEel6JybF

6

7

8

9

10

tXvXlGVDFP

yJ5d4qB3ec

dFfomehAt

pH9IceKF4f

8tby3RRKsh

Copy

Download

I have stored these codes in a password manager

Add a secondary MFA method

Done

Sign-in has been paused to keep your account safe

EIAMS support can help you get back in by verifying your identity to restore access.

Contact EIAMS

02. Role

Operating across constraints, not within them

My work sat inside the Enterprise Identity Access Management System, a core system responsible for securing access across government services. It handles authentication at scale, which means every interaction is tied to compliance, risk, and Salesforce platform constraints that can’t be casually redesigned. This was my first lead UI/UX role within an enterprise.

03. THE PROJECT 

MFA user

experience uplift

Brief

The technical team is seeking a UX uplift of the MFA system, focusing on improvements in language, communication, interface design, and boosting user confidence in recovery. This discovery phase was designed to understand why users struggle with MFA setup, recovery, and ongoing management of authentication methods.

Approach

The research aims to uncover trust issues, cognitive load challenges, and points of hesitation, while identifying opportunities to reduce admin intervention and improve overall user confidence. Insights will guide enhancements that make the MFA experience clearer, more intuitive, and resilient in real-world conditions.

5 pillars of Human Centred Design Section, DSAI

Shape strategic direction: Start by understanding people and the problem space, using real insights to define what we’re solving and where the product should go.

Build the Case: Turn those insights into a clear direction, aligning user needs with business goals and defining what success looks like.

Design & Test: Design solutions and test them with users early, making sure they actually work and feel right before moving forward.

Test & Deliver Solutions: Refine and ship solutions through continuous testing, ensuring they are usable, accessible, and hold up in real scenarios.

Measure Impact & Improve: Track how the solution performs after release, using data and feedback to iterate and improve over time.

04. PROCESS

Discovery

Research Objectives

Do users understand what MFA protects, and trust this MFA’s legitimacy?

Observed comprehension patterns, user quotes, trust signals

Where do users hesitate, re-read or become unsure?

Observe time-on-task, confusion, re-read frequency

Research Objectives

How do users recover from error or lockouts?

Measure recovery success and emotional responses

What makes users skip or under-prepare MFA setup?

Behavioural insight, qualitative reasoning

Solution

Usability Testing - Sprint 1

To tackle this properly, I set up a quick discovery to concept sprint that compressed research and design into a tight, focused cycle. Sprint one was centred on understanding, not solutioning. I ran think aloud usability testing alongside a heuristic evaluation to break down how the MFA actually performs under real use.

Process Overview

01

02

03

04

05

Kickoff

DISCOVERY

SYNTHESIS

SOLUTION

SHOWCASE

Brief

Current state

walkthrough by

tech team and BAs

Create UX test

Gather participants

Heuristics eval

Conduct tests

Build findings report

Lean ideation

Feasibility

Synthesise

Create solution

Build final report

Recommendations

Showcase

05. Design Discovery

The art of testing

Discovery

Sprint 1

In this sprint, I took a deep dive into the current MFA experience, reframing four system flows into three core user tasks based on how users actually move through authentication.

User flows for testing

Registration flow

Primary user goal:

Set up MFA device for secure access

System Trigger:

No recognised registered account, first time login

flow branches:

Authentication application, windows hello or security key, passkey

Login flow

Primary user goal:

Authenticate and access portal

System Trigger:

Successful registration, User

flow branches:

Authentication application, windows hello or security key, passkey, Reset device, New device. Soft lock.

Reset device flow

Primary user goal:

Remove a lost device OR reset MFA account

System Trigger:

User-initiated after soft lock, or via device management

flow branches:

Removal of registered methods including OATH, Windows hello, passkey. Hard lock.

New device flow

Primary user goal:

Add backup secondary MFA

System Trigger:

User initiated

flow branches:

Step up authentication - then adding Authentication application, windows hello or security key, passkey

Usability Testing

Date: Nov 24 - Dec 10

Method: Remote, think-aloud scenarios

Participants: 10

User tasks

Registration options

There are two options for Multi Factor Authentication

One-Time Password (OTP) authentication uses a devices such as a smartphone app to provide a unique numerical passcode that is only usable for a limited time.

Windows Hello is an authentication technology in your laptop that uses facial recognition, fingerprint, or a PIN means to confirm your identity.

Next

Registration MFA task

Testing the registration interface, content and recovery codes.

Windows hello option is programmed to fail to test error message and user recovery

Testing authentication application and passkey registration flows

Type to search

My Passkey Device

OATH Device

Reset Device

New Device

Adding secondary device task

Testing ‘Step-up’ interpretation

Testing registration for passkey, windows hello and authentication application

Testing user’s mental modal of adding backup methods

Login Failure

Your Account has been locked.

You are unable to proceed with MFA Verification until your account is unlocked.

Please email eiamsoperations@health.gov.au for support. Transaction ID: [b849f-49fd-bd54-gm24-request-1]

Log in task (sad path)

Testing login and error messages with all MFA methods available

Testing soft lock

Testing hard lock

06. FINDINGS

Six gems of truth

Synthesis

Sprint 2

In this sprint, I used affinity mapping of all quotes from the 10 interviews to find about 12 themes which I condensed into 6 key findings which I’ll base my recommendations off.

Insight 1

The wording is all over the place, so users are guessing what each button actually does and misinterpreting flows and information.

Violated usability heuristics:

Consistency and Standards

Match between system and real word expectations

View evidence

Insight 2

The wording is all over the place, so users are guessing what each button actually does and misinterpreting flows and information.

Violated usability heuristics:

Consistency and Standards

Match between system and real word expectations

View evidence

Insight 3

The wording is all over the place, so users are guessing what each button actually does and misinterpreting flows and information.

Violated usability heuristics:

Consistency and Standards

Match between system and real word expectations

View evidence

Insight 4

The wording is all over the place, so users are guessing what each button actually does and misinterpreting flows and information.

Violated usability heuristics:

Consistency and Standards

Match between system and real word expectations

View evidence

Insight 5

The wording is all over the place, so users are guessing what each button actually does and misinterpreting flows and information.

Violated usability heuristics:

Consistency and Standards

Match between system and real word expectations

View evidence

Insight 6

The wording is all over the place, so users are guessing what each button actually does and misinterpreting flows and information.

Violated usability heuristics:

Consistency and Standards

Match between system and real word expectations

View evidence

Design Concepts

Glimpse of a dream

I brought the vision to life with 20 hi-fi design

concepts, each offering a unique way to progress MFA

Language and Clarity

Tightening UX copy and reducing ambiguity across the system was another key goal. By simplifying language, aligning terminology, and making intent explicit, this direction aimed to remove cognitive load and make each step understandable.

Feedback and system response

The concepts addressed the lack of feedback across key moments in the journey. By introducing clear system states, confirmations, and progress indicators, this direction aimed to reinforce confidence and make the system feel responsive.

Welcome to MFA Setup

Pick a method that works best for you.

Use an app

Get a one-time passcode from any authenticator app

Secure

Set up

Face, fingerprint or PIN

Use your device to sign in faster with a passkey

Secure

Set up

Physical security key

Use a physical key you plug in to verify your identity

Very Secure

Set up

Link app

Verify

Backup

You’re almost done. Save these codes to avoid being locked out.

Emergency recovery codes for Authentication app

1

2

3

4

5

TbvIWgF8v3

nKEhCNPcNR

v1DAG6sCX6

11P4hBLXA1

1xEel6JybF

6

7

8

9

10

tXvXlGVDFP

yJ5d4qB3ec

dFfomehAt

pH9IceKF4f

8tby3RRKsh

Copy

Download

I have stored these codes in a password manager

Done

The Recommendation

After evaluating the system, it became clear that while MFA was technically sound, the experience itself was creating hesitation and low confidence for users. We saw a strong opportunity in reshaping how the system communicates and guides users, turning it into something far more intuitive and trustworthy without needing to change the underlying architecture.

07. RECOMMENDATIONS

Security

within UX

Solution

Sprint 3

In this sprint, we set out to generate innovative ideas

that deliver exceptional customer experiences and

uncover new business opportunities, all without

letting technical limitations hold us back.

UX Outcomes

UX Psychology Toolkit

Design Principles

Content Framework

Extended Design Exploration: Your Monthly Wrap-Up

Welcome to MFA Setup

Pick a method that works best for you.

Use an app

Get a one-time passcode from any authenticator app

Secure

Set up

Face, fingerprint or PIN

Use your device to sign in faster with a passkey

Secure

Set up

Physical security key

Use a physical key you plug in to verify your identity

Very Secure

Set up

MFA set up

The MFA set-up was redesigned to reduce hesitation from the first interaction, shifting from technical labels to clear, recognisable choices that users can understand instantly. Each method is supported with familiar icons and plain language, allowing users to compare options quickly and select what feels right without second-guessing.

Design Rationale

Use clear icons alongside each method for faster recognition and recall

Apply warm, plain language tone to lower anxiety during initial setup

Use secondary buttons to signal methods are not yet set up

Present all setup options consistently to support comparison and informed choice with secure labels

UX Psychology Applied

Cognitive Ease

Lowering cognitive load through simplified language and consistent patterns reduces hesitation and decision fatigue. This makes users less likely to skip or avoid secure methods, leading to stronger adoption of recommended authentication practices.

Enable back up

The recovery code step was redesigned to guide users through backup setup with clarity and confidence, positioning it as a supportive safeguard rather than an optional extra. By framing this moment as “almost ready,” the flow builds momentum at the final step and reduces the likelihood of drop-off, helping users feel close to completion rather than introducing friction.

Design Rationale

Use reassuring and friendly language to frame backup setup as supportive rather than mandatory

Introduce a checklist pattern to clearly communicate progress and reduce uncertainty

Show the final step as “almost ready” to increase perceived momentum and reduce drop-off


Gate the primary completion action until required steps are acknowledged, reinforcing safe behaviour

UX Psychology Applied

Perceived Progress + Completion Bias:

Framing the step as “almost ready” and using a checklist creates a sense of momentum, encouraging users to complete setup rather than abandon at the final stage.

Final attempt and soft lock

This moment was redesigned to handle failure with clarity and composure, turning a typically frustrating lockout into a controlled, understandable pause. Before users hit a soft lock, a clear “final attempt” message is surfaced inline, setting expectations early and giving users a chance to act more carefully rather than being caught off guard.

Design Rationale

Surface a clear “final attempt” message inline to set expectations before a temporary soft lock

Demote high-risk actions such as resetting methods, with secondary actions and supporting information

Frame the soft lock as a short security pause using warm, human language to reduce frustration and blame

Offer clear escape hatches and recovery options, including trying another method or setting a reminder

UX Psychology Applied

Expectation Setting + Loss Aversion::

Making the final attempt visible prepares users for potential lockout, reducing shock and encouraging more careful behaviour.

Control & Emotional Regulation:

Framing the lock as a temporary pause with clear next steps reduces anxiety, helping users stay composed and make better recovery decisions.

Error and Success Feedback

Error and success states were redesigned to feel clear, consistent, and supportive, removing ambiguity at moments where users are most vulnerable to confusion. Errors are now surfaced inline, directly beneath the input, making it immediately obvious what went wrong without forcing users to search for feedback.

Design Rationale

Place error messages inline, directly beneath the input for immediate visibility

Use calm, human language in error messages and headings to avoid blame and provide clear instruction

Use supportive iconography to visually signal blockers while maintaining trust

Provide a clear recovery path with a back action or alternative method

UX Psychology Applied

Error Recovery & Cognitive Clarity:

Inline feedback reduces search and confusion, helping users quickly understand and correct mistakes without breaking flow.

New

Project

Potential

Unlocked

This work opened up a series of opportunities beyond the initial MFA uplift, demonstrating how targeted UX improvements can scale across systems and teams.

Design System Integration

The outcomes created a strong foundation for integrating the Aged Care Design System, aligning patterns, language, and components across the experience to drive consistency and long-term maintainability. This task could take up to 3 months ensuring platform and product compliance.

Further Testing & Iteration

A second round of user testing was unlocked to validate improvements, refine UX copy, and iterate on flows with greater confidence, ensuring the system continues to improve based on real user behaviour.

Bolstering HCD Capability

The work showcased what a designer operating within HCD can deliver, shifting perception from interface design to system-level thinking. It highlighted the value of research-led design in shaping compliance-driven products and influencing how the wider department approaches digital experiences.

06. Closing

The lessons

Ultimately, this work reinforced that improving complex systems isn’t about reinventing them, but about making them understandable. While the MFA system was already functional and secure, the real opportunity sat in how it communicated, guided, and supported users through critical moments. Small shifts in language, structure, and feedback had an outsized impact on confidence and completion.

Winning Moments

Running a focused discovery sprint combining usability testing and heuristic evaluation allowed me to quickly uncover real behavioural patterns and translate them into actionable design decisions.

Working within a tightly constrained environment sharpened my ability to design solutions that respect technical and policy limitations while still improving the experience meaningfully.

This project highlighted that in security contexts, clarity is trust. Every decision, from copy to feedback states, directly influenced whether users felt confident or uncertain.

Lessons Learned

Inconsistencies in language and patterns compound across flows, so solving them requires system-level thinking rather than isolated fixes.

The most important moments in MFA are when things go wrong. Investing in error, recovery, and lock states has the biggest impact on user trust.

Everyone dislikes extra steps

on assignment @ frog, Sydney

on assignment @ frog, Sydney

currently @ frog, AU

on assignment @ frog, Sydney