[OpenID] New OpenID Customer Research Activity - Google research on federated login

Eric Sachs esachs at google.com
Tue Sep 23 23:59:18 UTC 2008


>> Do you have any information on how many steps a user was usually willing
to put up with?In our research document (
http://sites.google.com/site/oauthgoog/UXFedLogin) there is a section
titled "Comparison Summary for Sign Up."  It compares that traditional
approach with the one we are suggesting, but admits that our approach adds a
third page.  We had some research where there was a fourth step, and in each
case we got audible sighs of annoyance from the users, and specific
complaints about the "# of steps."  So 3 pages seems to be the maximum
before really hurting usability.  The research that Allen Tom from Yahoo
showed last week also seemed to fit with that conclusion.

However, if the site was one that required E-mail validation, then that
theoretically removes some additional work the user has to do.  But users
seemed to be so trained on that process, that they just accepted it as a
requirement.  So they did not give us "points" for removing that step which
made them willing to do more work in other places.  In general though,
websites that require E-mail validation report that it causes an additional
15% dropoff, especially if their E-mail messages end up in spam folders.  So
it may be that adding a 4th page will lose the RP fewer users then that 15%
dropoff, and thus overall it would be worth it.  That type of statistic
would need to be measured on a live site though, as opposed to using
usability research.

However, even if that is true, RPs would still prefer to both avoid that 15%
dropoff AND avoid any additional dropoff from a 4th (or additional) pages.
 So if we want to convince them to support advanced features which require
more steps, such as login with a vanity URL, then we probably are going to
need some live sites who can share trustworthy statistics that show this
feature is worth it.


On Tue, Sep 23, 2008 at 3:07 PM, max engel <max at 8bitkid.com> wrote:

> Do you have any information on how many steps a user was usually willing to
> put up with?  Also, I definitely agree on the TOS injection, that is
> feedback we are are getting from RP's as well.  It would be great to come up
> with some standard behaviors for that piece.
> Also, I wonder if an RP would trust e-mail more if it was coming from a
> Portable Contacts endpoint being declared in the XRDS as opposed to just
> being a data field passed by the OP...
>
> Cheers, Max
>
> On Sep 23, 2008, at 2:56 PM, Eric Sachs wrote:
>
> >> So, in essence, this solution is geared towards RP's that mandate
> needing an e-mail address and don't trust an OP's assertion of ownership,
> thereby forcing them to only accept e-mail-based OP's.
>
> A better way to put it might be that it is geared towards RPs who measure
> the # of user actions in the signup flow as the definition of success.
>  Until we have some other good statistics to show them from live RPs, that
> seems to be the primary measure that they use to grade the different
> options.  That is why we added such a long section to our UI research which
> describes the specific # of steps in different scenarios.  And along those
> lines, that is one of the reasons many of them are interested in the idea of
> the IDP showing the terms of service of the RP just to reduce the # of steps
> further.
>
> >> I agree that many sites do want e-mail, but this is a data field that
> can be gathered after authenticating against a non-email-based OP.
>  Also, sites that don't require e-mail address validation after initial
> sign-up probably can trust an OP's claim about a user's e-mail address.
>
> We thought so as well.  But what we then learned from talking to existing
> websites that have experimented with federated login is that without the
> immediate E-mail validation by the IDP, the RP has no way to determine
> whether the user has a pre-existing legacy account.  So they need to both
> ask the user if they do (and to enter the legacy E-mail/password), as well
> as to send the background E-mail validation.  If they don't add this step, a
> lot of users end up with multiple accounts and get really confused.  If they
> do add these steps, then our "grade" goes down.
>
> I am hoping to find an RP for a mainstream website that is willing to try
> this new login box style, but to accept not only E-mail address inputs, but
> also OpenID domains/vanity-URLs.  Then hopefully they could report the % of
> accounts that use each of these 3 types, as well as the % success rate for
> the signup flow of each step.  My personal guess is that anyone who is
> technical enough to type in a vanity URL will be willing to perform the
> extra steps for legacy account matching & E-mail address validation.
>  However that is only a guess.
>
> On Tue, Sep 23, 2008 at 2:41 PM, max engel <max at 8bitkid.com> wrote:
>
>> So, in essence, this solution is geared towards RP's that mandate needing
>> an e-mail address and don't trust an OP's assertion of ownership, thereby
>> forcing them to only accept e-mail-based OP's.  I agree that many sites do
>> want e-mail, but this is a data field that can be gathered after
>> authenticating against a non-email-based OP.  Also, sites that don't require
>> e-mail address validation after initial sign-up probably can trust an OP's
>> claim about a user's e-mail address.
>>
>> I do have concerns about pushing RP's to adopt this sort of federated
>> model, because it creates a hierarchy of OP's.  That worries me, as does the
>> potential fragmented user experiences between user's who use a URL-based OP
>> and those coming from an e-mail provider...
>>
>> _max
>>
>>
>>
>> On Sep 23, 2008, at 1:22 PM, Eric Sachs wrote:
>>
>> >> Now, with my "MySpace" hat on, I am biased towards URL-based identity,
>> since our users will leverage their vanity URL as their OpenID
>> Roughly half of Google Accounts are not gmail users, so we actually share
>> that same bias :-)  The proposal in this research basically means that we
>> would only be able to help half our users with federated login, and that is
>> really unfortunate.
>>
>>
>>
>> >> I'd love to see RP's move towards similar design patterns like this to
>> help users get acclimated to Federated Login, but do want to make sure that
>> it would be extensible to non-email based OP's.
>>
>> There are certainly RPs who are not as worried about E-mail, and for those
>> our best (but early) results have been to change this "next generation"
>> login box to replace "Enter your E-mail address" with "Enter your E-mail
>> address or OpenID domain."  We specifically left out the visual logo of
>> OpenID and appended the term domain.  Those changes seem to reduce the % of
>> regular users who were confused, but did catch the attention of highly tech
>> savvy users who were aware of OpenID.  However it still requires them to
>> know the domain of their OpenID IDP, and so that restricts further the % of
>> savvy users who can make use of that advanced feature.  We tried a few
>> options for leading the user to a drop down of IDPs, but they all had
>> surprisingly high negative impact on regular users.  Another problem the
>> live RP sites today who act as OpenID IDPs have found that after a user
>> signs up with their site using OpenID, they then have to prompt them to find
>> out if they have a legacy account on that site which should be migrated.
>>  Advanced users might not mind that, but for average users every additional
>> step in the account signup process causes a significant drop off.
>>
>> However even beyond the UI problem, the bigger problem is that most RPs
>> are unwilling to give up on having an E-mail address for their customers,
>> and they don't trust one OpenID IDP to assert that a user owns an E-mail
>> address at a different provider.  If an RP of that type wants to support
>> IDPs that are not E-mail providers, then their account signup process will
>> require the user to both prove ownership of an OpenID URL, and then prove
>> ownership of an E-mail address via a second flow.    If we wanted to reduce
>> that usability problem, we could try to get E-mail providers to allow their
>> users to publicly specify a different OpenID IDP which was their identity
>> provider.  That might be enough for an RP like an online magazine to allow
>> an IDP like MySpace or Google to assert the E-mail address of a school
>> alumni E-mail address.  But this is a pretty advanced use case, so while we
>> hope it will possible to do this some day (so that we can help the other
>> half of our user base), we have been more focused in the near term on the
>> simpler model around E-mail address.
>>
>> Interesting,
>>
>>
>>
>>
>> On Tue, Sep 23, 2008 at 12:48 PM, max engel <max at 8bitkid.com> wrote:
>>
>>> My main concern is that the federated model doesn't support IDP's who use
>>> URL's for users.  Now, with my "MySpace" hat on, I am biased towards
>>> URL-based identity, since our users will leverage their vanity URL as their
>>> OpenID, but I imagine that blogs, etc. are all in a similar situation where
>>> we want to acclimate our users to thinking of themselves as URL's.
>>> While EAUT is definitely a great service for IDP's that are e-mail based,
>>> designing a federated login system around "Enter your eMail Address" does
>>> worry me.
>>>
>>> I'd love to see RP's move towards similar design patterns like this to
>>> help users get acclimated to Federated Login, but do want to make sure that
>>> it would be extensible to non-email based OP's.
>>>
>>> _max
>>>
>>> On Sep 23, 2008, at 8:55 AM, Eric Sachs wrote:
>>>
>>> >> I do have a security concern with this approach in that most likely
>>> the AOL user will enter their AOL password because of the past experience.
>>> This causes a security leak for the user even if buy.com is not just
>>> throwing away the value.
>>>
>>> Yes, we did see that in user's who came back the "second time."  However
>>> the RP can detect that case, and warn the user of the mistake they are
>>> making which should also help train them in the future both on this RP, and
>>> others.  The IDP can also try to warn the user on the first identity
>>> verification step to avoid making that mistake, but that is not as a good a
>>> "trainable moment."  Along these same lines, we saw that by adding icons for
>>> IDPs to a login box, the pretty sizeable % of users immediately tried to
>>> enter their IDP E-mail/password directly into the login box.  Allen Tom from
>>> Yahoo shared some data last week that showed they saw the same thing.  I
>>> don't think there is a 100% perfect solution here, but the worst case is
>>> that RPs don't support federated login at all and end users just choose to
>>> use the same login/password as their E-mail provider across lots of other
>>> sites (and our stats indicate that most sadly do).
>>>
>>>
>>> >> Would it not be possible to use AJAX to check the user's entered email
>>> address against the buy.com data base to see if they've registered and
>>> if so, hide all the options and just show the user the login button? Or
>>> maybe replace the "Help me login" and "I have a password" options with text
>>> that says, "you are already a member of buy.com via your AOL identity.
>>> All you have to do is click the login button?"  I suppose that might scare
>>> some users because they would think their account doesn't have any password
>>> at all.
>>>
>>> This was an idea we considered and is on our list to evaluate, but we
>>> don't have any usability data on it yet.  Technically there were some
>>> concerns about how well this would interact with browser auto-fill of login
>>> box information.  It would be great if a live RP tried out a model like this
>>> and reported back the results.
>>>
>>>
>>> On Tue, Sep 23, 2008 at 8:02 AM, George Fletcher <gffletch at aol.com>wrote:
>>>
>>>> Some thoughts after reading through the summary (
>>>> http://sites.google.com/site/oauthgoog/UXFedLogin) page...
>>>>
>>>>> Fortunately, even though they are confused, nearly all users did enter
>>>>> their E-mail address and clicked the login button.  As long as they do that,
>>>>> it does not matter whether they chose Yes or No in the UI, nor does it
>>>>> matter whether they typed a password.  Buy.com just needs to know that their
>>>>> domain is aol.com, and can then redirect them to AOL to verify their
>>>>> identity.
>>>>>
>>>> I do have a security concern with this approach in that most likely the
>>>> AOL user will enter their AOL password because of the past experience. This
>>>> causes a security leak for the user even if buy.com is not just
>>>> throwing away the value.
>>>>
>>>> Would it not be possible to use AJAX to check the user's entered email
>>>> address against the buy.com data base to see if they've registered and
>>>> if so, hide all the options and just show the user the login button? Or
>>>> maybe replace the "Help me login" and "I have a password" options with text
>>>> that says, "you are already a member of buy.com via your AOL identity.
>>>> All you have to do is click the login button?"  I suppose that might scare
>>>> some users because they would think their account doesn't have any password
>>>> at all.
>>>>
>>>> Great research. It really helps to identify the problematic cases and
>>>> where we need to focus UI efforts.
>>>>
>>>> Thanks,
>>>> George
>>>>
>>>>
>>>> Eric Sachs wrote:
>>>>
>>>>>  Last Week the OpenID Foundation held the first meeting of their
>>>>> Content Provider Advisory Committee to gather feedback on how to evolve the
>>>>> best practices for using OpenID so that it might be used by websites in a
>>>>> larger number of market segments. The meeting included representatives from
>>>>> many mainstream content websites including The New York Times, BBC, AARP,
>>>>> Time Inc., and NPR.  I attended from Google, and thought the team who pulled
>>>>> together the meeting did a great job arranging it.
>>>>>
>>>>> Google has been researching federated login techniques, and at the
>>>>> meeting we showed how a traditional login box might evolve (see below) to a
>>>>> new style of login box that better supports federated login.
>>>>>
>>>>> <http://sites.google.com/site/oauthgoog/UXFedLogin>
>>>>>
>>>>> We also shared a summary <
>>>>> http://sites.google.com/site/oauthgoog/UXFedLogin> of our usability
>>>>> research that explains how this helps a website add support for federated
>>>>> login for some users without hurting usability for the rest of the website's
>>>>> user base.  This research is not yet finalized, and we are still working
>>>>> with a bunch of companies to gather more feedback to tune this research.  If
>>>>> you have any feedback, feel free to get in touch with me.  However more
>>>>> generally we hope people will continue to contribute to the user experience
>>>>> discussions that are happening regarding many different use cases for
>>>>> OpenID, and not just the one covered in this research document.
>>>>>
>>>>> p.s. For Google's original blog post on this research, please refer to
>>>>> http://google-code-updates.blogspot.com/2008/09/usability-research-on-federated-login.html
>>>>>
>>>>> Eric Sachs
>>>>> Product Manager, Google Security
>>>>>
>>>>>
>>>>> ------------------------------------------------------------------------
>>>>>
>>>>> _______________________________________________
>>>>> general mailing list
>>>>> general at openid.net
>>>>> http://openid.net/mailman/listinfo/general
>>>>>
>>>>>
>>>>
>>> _______________________________________________
>>> general mailing list
>>> general at openid.net
>>> http://openid.net/mailman/listinfo/general
>>>
>>>
>>>
>>
>>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20080923/b406d40f/attachment-0002.htm>


More information about the general mailing list