Send Link mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        https://mailman.anu.edu.au/mailman/listinfo/link
or, via email, send a message with subject or body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Link digest..."


Today's Topics:

   1. Re: The Naivete of Cloud-Using Organisations (Roger Clarke)
   2. Microsoft Passkeys (Stephen Loosley)


----------------------------------------------------------------------

Message: 1
Date: Sat, 14 Dec 2024 12:01:09 +1100
From: Roger Clarke <[email protected]>
To: link <[email protected]>
Subject: Re: [LINK] The Naivete of Cloud-Using Organisations
Message-ID: <[email protected]>
Content-Type: text/plain; charset=UTF-8; format=flowed

> On Friday, 13 December 2024 7:52:13 AM AEDT Roger Clarke wrote:
>  >> Organisations that choose to be dependent on remote services could 
> be expected to have fallback arrangements designed, trialled and at the 
> ready. These might take the form of alternative cloud suppliers.

On 14/12/2024 11:43, David wrote
> And those organisations should also take care to ensure there's no 
> common factor in their choice of suppliers.? It could be embarrassing 
> if, having paid lots to keep the alternative going for years on end, it 
> turned out that both cloud suppliers failed because they shared the same 
> comms outage, database bug, malware intrusion, political upheaval, or 
> whatever.? And that's a level of detail which is almost impossible to 
> identify.

Without checking, I think my work back then did indeed omit to mention 
common dependencies, hidden-single-points-of-failure, or suchlike.


> I don't think there's any answer to that conundrum, even in principle.  
> Organisational size & complexity is the issue.? The bigger they are, the 
> harder they fall.? So to speak...

Hmmm, metaphors get awkward, don't they.  'Cloudfall'?

At various times I've used 'computing clouds on the horizon', 'cloudy 
future' and 'cloudburst', even 'stormclouds', 'nimbus'.

I'm sure 'pyrocumulus' could be applicable at some stage too.

'cloutages' maybe?  'fog', 'mist', 'pall', 'mare's tales', ...


Sorry, but it's been a hard year and I need a break.


-- 
Roger Clarke                            mailto:[email protected]
T: +61 2 6288 6916   http://www.xamax.com.au  http://www.rogerclarke.com

Xamax Consultancy Pty Ltd      78 Sidaway St, Chapman ACT 2611 AUSTRALIA 

Visiting Professorial Fellow                          UNSW Law & Justice
Visiting Professor in Computer Science    Australian National University


------------------------------

Message: 2
Date: Sat, 14 Dec 2024 13:57:20 +0000
From: Stephen Loosley <[email protected]>
To: "[email protected]" <[email protected]>
Subject: [LINK] Microsoft Passkeys
Message-ID:
        
<sy5p282mb44094d8abf2f0a92dcfc72c5c2...@sy5p282mb4409.ausp282.prod.outlook.com>
        
Content-Type: text/plain; charset="Windows-1252"


Convincing a billion users to love passkeys: UX design insights from Microsoft 
to boost adoption and security

By Sangeeta Ranjit, Microsoft Group Product Manager
By Scott Bingham, Microsoft Principal Product Manager

December 12, 2024  
https://www.microsoft.com/en-us/security/blog/2024/12/12/convincing-a-billion-users-to-love-passkeys-ux-design-insights-from-microsoft-to-boost-adoption-and-security/


There?s no doubt about it: The password era is ending. Bad actors know it, 
which is why they?re desperately accelerating password-related attacks while 
they still can.

At Microsoft, we block 7,000 attacks on passwords per second?almost double from 
a year ago. At the same time, we?ve seen adversary-in-the-middle phishing 
attacks increase by 146% year over year. 

Fortunately, we?ve never had a better solution to these pervasive attacks: 
PASSKEYS.  
https://www.microsoft.com/security/business/security-101/what-is-passkey

Passkeys not only offer an improved user experience by letting you sign in 
faster with your face, fingerprint, or PIN, but they also aren?t susceptible to 
the same kinds of attacks as passwords. Plus, passkeys eliminate forgotten 
passwords and one-time codes and reduce support calls.

In this blog, we?ll share how Microsoft approached this unique opportunity to 
bring passkeys to consumers.

Embracing the opportunity to improve sign-ins

In May 2024, Microsoft announced that you can sign in to your favorite consumer 
apps and services, such as Xbox, Microsoft 365, or Microsoft Copilot, using a 
passkey. Since passkeys are still a relatively new technology, as we began this 
journey, we asked ourselves: How are we going to convince more than a billion 
people to love passkeys as much as we do? 
https://www.microsoft.com/en-us/security/blog/2024/05/02/microsoft-introduces-passkeys-for-consumer-accounts/

Somehow, we had to convince an incredibly large and diverse population to 
permanently change a familiar behavior?and be excited about it.

To make sure we got our passkey experience right, we adopted a simple 
methodology: Start small, experiment, then scale like crazy. The results have 
been encouraging:

Signing in with a passkey is three times faster than using a traditional 
password and eight times faster than a password and traditional multifactor 
authentication.

Users are three times more successful signing in with passkeys than with 
passwords (98% versus 32%).
99% of users who start the passkey registration flow complete it.


Step 1: Start small

Our first step was to build support for passkeys that could work across our 
apps. In May 2024, we added a simple option to the Microsoft account settings 
page to enroll a passkey:

"Add a new way to sign in or verify" dialog box offering three options:

* Face, fingerprint, PIN, or security key: Use a device to sign in with a 
passkey (accompanied by a person and key icon).
* Use an app: Approve sign-in notifications on a phone (represented by a shield 
with a lock icon).
* Email a code: Receive a code via email to sign in (depicted with an envelope 
icon).

A "More choices" button is displayed at the bottom.

We also added a new option to authenticate with a passkey on our sign-in page:

"Microsoft Sign-in options" dialog box featuring three options:

* Face, fingerprint, PIN, or security key: Use a device to sign in with a 
passkey (accompanied by a person and key icon).
* Sign in with GitHub: Authenticate using a GitHub account (represented by the 
GitHub logo).
* Forgot my username: Assistance for recovering a username (depicted with a 
question mark icon).

A "Back" button is located at the bottom right.

As thousands of people began enrolling and using passkeys every day, we learned 
a lot. For example, while the term ?passkey? was sometimes unfamiliar, the 
phrase ?face, fingerprint, or PIN? was generally well understood, so it was 
important to connect these two concepts in our user experience (UX).


Step 2: Experiment

With a good foundation in place, we began to experiment. We didn?t want 
passkeys to be ?just another way to sign in.? We wanted them to be ?the best 
way to sign in.?

To do this, we had to figure out when, where, and how to approach users to 
enroll a passkey. We developed a hypothesis that a passive approach (requiring 
users to visit their account settings on their own to enroll a passkey) would 
never yield the results we wanted, so we needed to proactively invite users to 
enroll a passkey.

When and where to nudge users

The most natural enrollment opportunity is when a user initially creates an 
account. But when and where would be the best time for existing users to create 
a passkey? Right after they sign in? During a password reset?

While we were cautious with any changes that might prevent our users from 
quickly accessing their accounts, we discovered that users were very 
enthusiastic about the invitation to enroll a passkey?even when they weren?t 
expecting it. About 25% of users who saw a nudge engaged with it?five times our 
pre-launch expectations. We also learned that the option to create a passkey 
where users manage their credentials accounted for fewer than 1% of total 
enrollments. These results confirmed our hypothesis.  

How best to nudge users

As we began to understand where and when to invite users to enroll passkeys, we 
also explored ?how.? We ran multiple user studies and tested every pixel in our 
nudge screen to answer the question, ?What would motivate a user to stop what 
they?re doing and enroll a passkey??

First, we wanted to understand which value proposition would resonate most. 
Surprisingly, an easier sign in didn?t resonate with users as strongly as a 
faster or more secure sign in. Perhaps less surprising was discovering that 
security and speed resonated almost equally. Approximately 24% of users shown a 
message emphasizing security clicked through while approximately 27% of users 
shown messaging about speed clicked through.

Two screenshots of a Microsoft sign in page on a mobile device, each promoting 
the use of a passkey for signing in. The left screenshot highlights security 
with the text: "Sign in more securely with a passkey" and a security icon, 
showing a 24.07% increase in security. The right screenshot emphasizes speed 
with the text "Sign in faster with a passkey" and a speed icon, showing a 
26.93% increase in speed. Both screenshots include the email address 
[email protected] and options to "Skip for now" or "Next."

Figure 4. Messaging about ?better security? and ?faster sign-in? enticed more 
users to enroll a passkey than ?ease of use.?

If a user sees a nudge and chooses to enroll a passkey, great! But, if they see 
the nudge and decide that now isn?t the right time, we wanted to frame their 
decision in a positive way. The button text, ?Skip for now,? respects that the 
user isn?t ready to enroll a passkey yet and lets them continue with what they 
were doing, but it also sets the expectation that we?re going to ask again. 
We?re implementing logic that determines how often to show a nudge so as not to 
overwhelm users, but we don?t let them permanently opt out of passkey 
invitations. We want users to get comfortable with the idea that passkeys will 
be the new normal.

A comparison of different options tested for deferring a prompt on a Microsoft 
sign in screen. The left side displays various buttons with text options such 
as "Later," "Not now," "Maybe later," "Skip," "No thanks," and "Skip for now." 
The right side shows a Microsoft sign in screen with the email address 
[email protected] and a prompt to "Sign in faster with a passkey." Below the 
prompt, there is an option to "Skip for now" highlighted with an arrow pointing 
to it, and to the right of that button, a "Next" button.

Figure 5. We don?t let users permanently opt out of passkey invitations, but we 
keep the messaging friendly.

The exciting results of our experiments are helping us craft the best 
experience possible for our users, and we?re continuing to evolve. We encourage 
you to run your own experiments as well. Your products and users are different 
from ours and you might discover different outcomes. However, if you?re looking 
for a good place to start, messaging about speed and security is probably a 
safe bet. We also encourage you to reference the fantastic research that the 
FIDO Alliance has done, along with the UX guidelines they?ve published.


Step 3: Scale

As our users began to enroll passkeys at scale, our sign-in experience needed 
to behave more intelligently to encourage passkey use. As we redesigned the 
experience, we followed these guiding principles:

Secure: A great sign-in experience should prioritize security without 
sacrificing usability.

Low cognitive load: A great sign-in experience should have low cognitive load. 
People don?t want to stare at a list of sign-in options to try to decide which 
one to use. They just want in, and we should make that easy for them.

Evolving: A great sign-in experience should not only prioritize the best 
available method, but also continuously move users to more secure methods.

With these principles in mind, we came up with a completely reimagined sign-in 
experience. If the user has a passkey available, it?s always the preferred 
method. We don?t list all the different ways the user can sign in and ask them 
to choose one, we just show the passkey sign in user interface (UI) and that?s 
it. They are safely and quickly signed in.

A Microsoft sign in screen showing the options to log in with TouchID sign in.

Figure 6. The sign-in experience defaults to passkey if the user has one 
available.

If the user doesn?t have a passkey yet, we determine the next best available 
credential. Once the user successfully authenticates, we immediately invite 
them to enroll a passkey. If they do, then the next time they sign in, their 
passkey will be the best available credential and is set as the new default. 
Our initial launch of this new design saw a 10% drop in password use and a 987% 
increase in passkey use.

With data to support our design decisions, we?ve started setting defaults and 
introducing passkeys at a global scale:

* New users are invited to enroll a passkey when they create an account.

* Existing users are invited to enroll passkeys at key pivot points, such as 
after they sign in or during a password reset.

* Passkeys are set as the default sign-in option for users who have them.

Based on the current adoption rate, we project that hundreds of millions of new 
users will create and use passkeys over the coming months.


The passwordless journey

While enrolling passkeys is an important step, it?s just the beginning. Even if 
we get our more than one billion users to enroll and use passkeys, if a user 
has both a passkey and a password, and both grant access to an account, the 
account is still at risk for phishing. Our ultimate goal is to remove passwords 
completely and have accounts that only support phishing-resistant credentials. 
https://www.microsoft.com/en-us/security/business/solutions/passwordless-authentication

In 2022, we made it possible for users to completely remove their password and 
sign in with alternative methods. Since then, millions of users have deleted 
their passwords and protected themselves against password-based attacks. Now 
with passkeys, we can truly replace passwords with something faster, safer, and 
easier to use. It?s an ambitious vision, but we firmly believe in a 
phishing-resistant future for all scenarios, including account recovery and 
bootstrapping.

The image depicts a visual representation of the progression towards more 
secure authentication methods, illustrated as a mountain climb. The path up the 
mountain is marked with milestones, each representing a step towards 
eliminating passwords in favor of more secure alternatives. The milestones are:

Passwordless accounts"

Support passkeys
Passkeys by default
Passwords not supported
Phishing-resistant credentials only


Each milestone is represented by a yellow dot along a dotted path, indicating 
the journey towards the ultimate goal of using only phishing-resistant 
credentials. This image is relevant as it highlights the steps and progression 
towards enhancing security in digital authentication.


Learning from our experience

Here are a few suggestions based on our learnings:

Don?t be shy about inviting users to enroll passkeys. Our experiments show that 
people love passkeys and are ready for them. If they don?t enroll when you 
first ask, don?t assume their decision is permanent. Make sure to test a few 
variations of your designs and copy to determine what?s most effective. We 
found that messages around sign-in speed and improved security resonate 
strongly.

Make it as easy as possible to enroll and use passkeys. People want quick and 
secure access to their accounts. They don?t want to think about signing in. Set 
defaults to prioritize the best available method when possible.

Raise the floor. Passkeys are an important step on the path towards a more 
secure and seamless authentication future. Start planning ahead now to use only 
phishing-resistant credentials.


Finally, we believe that passkey adoption is a virtuous cycle, and 
transitioning the world away from passwords is bigger than any one company. As 
more relying parties prioritize passkey support, passkeys will first become 
recognized, then familiar, then expected?everywhere you sign in. As people 
become increasingly familiar with the usability and security benefits of 
passkeys, they?ll be more likely to enroll and use them on more sites. 
Together, we can convince billions and billions of users to enroll passkeys for 
trillions of accounts! We?re proud to be part of this collective effort and 
hope you will share learnings as well as you progress in your passkey journey.

https://www.microsoft.com/security/business/security-101/what-is-passkey

Learn more

To learn more about Microsoft Security solutions, visit our website. Bookmark 
the Security blog to keep up with our expert coverage on security matters. 
Also, follow us on LinkedIn (Microsoft Security) and X (@MSFTSecurity) for the 
latest news and updates on cybersecurity.

https://www.microsoft.com/en-us/security/business
https://www.microsoft.com/security/blog/
https://www.linkedin.com/showcase/microsoft-security/
https://twitter.com/@MSFTSecurity

1 Microsoft Digital Defense Report 2024.  
https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/Microsoft%20Digital%20Defense%20Report%202024%20%281%29.pdf

--


------------------------------

Subject: Digest Footer

_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link


------------------------------

End of Link Digest, Vol 385, Issue 18
*************************************

Reply via email to