Philip Jean-Pierre Senior UX Designer Strategist Case Study SSA Mobile Wage Reporting App MFA Authentication Federal UX

Keywords: Federal UX, Government Services, SSA, Mobile App Design, Accessibility, WCAG 2.2, MFA, Multi-Factor Authentication, Login.gov, UX Research, User-Centered Design, Service Design, Federal Services, Benefits Administration, Prototyping, Figma, Section 508, Compliance UX, Stakeholder Management.

Philip Jean-Pierre
UX Design Case Study · Federal Mobile

SSA Mobile Wage Reporting — Designing for Trust Under Compliance Pressure

Implemented MFA for a federal wage reporting app serving 70M+ SSA beneficiaries — without triggering the adoption collapse stakeholders feared. The real problem wasn't the security requirement. It was convincing users that the app still trusted them.

70M+
SSA Beneficiaries
~40%
Abandonment Reduction
~30%
Processing Delay Cut
35min
Avg. Call Time Replaced
27%
Smartphone-Only Target Demo
~5 min
New Completion Time
Prototype
Validation Stage Reached

01Context

Role: Senior UX Designer & Strategist

Team: 8-person cross-functional · product, engineering, policy, compliance

Scope: Mobile app + responsive web · iOS · Android

Agency: Social Security Administration (SSA)

Timeline: 2023–2024

What the App Was Supposed to Do

SSI recipients are required to report monthly wages to the Social Security Administration. The existing process was paper-based and phone-dependent — 35+ minutes per call, no confirmation receipt, processing delays that generated overpayments and incorrect benefit calculations. The app's job was simple: make wage reporting something people could do in five minutes on their phone.

The app existed. It worked. And it had no multi-factor authentication.

The Compliance Gap

Federal identity and authentication mandates — NIST SP 800-63B, OMB M-22-09 — required MFA for any system handling benefit or financial data. The wage reporting app was out of compliance. That gap had to close.

The Regulatory Mandate

NIST 800-63B and OMB M-22-09 required MFA for all federal systems handling financial or benefits data. The SSA MWR app was out of compliance. There was no path around it.

The Stakeholder Fear

Product and operations teams were convinced MFA would tank adoption. Users would hit the friction wall and revert to calling. Every gain the app had made would disappear.

The Real Stakes

This wasn't a feature debate. MFA failure meant regulatory exposure for the agency and real harm for beneficiaries — missed reporting windows, overpayment clawbacks, interrupted benefits.

The Design Problem

Implement MFA with enough rigor to meet federal standards without making users feel like the system didn't trust them. Reduce perceived friction while maintaining real security.

Methods

Federal Data Synthesis Competitive Benchmarking Stakeholder Interviews Accessibility Auditing Flow Analysis Prototype Validation

Tools

Figma Login.gov Design System USWDS Axure Confluence FigJam

02Challenge

Two Things That Can't Both Win — Until They Do

The core tension wasn't technical. Stakeholders were convinced that adding MFA would trigger the exact failure mode the app was built to prevent: users abandoning digital reporting and going back to the phone. They saw security as the enemy of adoption.

That framing was wrong, but it was grounded in a real pattern. Federal apps that bolt on authentication as an afterthought see drop-off. The question wasn't whether MFA creates friction — it does. The question was whether the friction had to feel adversarial.

The stakeholder argument: "If users hit a verification wall every time they open the app, they'll call instead. MFA undoes everything we built."

The actual problem: That's only true if MFA is designed like a checkpoint. Design it as part of the natural flow, and users don't experience it as friction — they experience it as the app taking their data seriously.

What Had to Be True for This to Work

Federal Compliance

NIST 800-63B AAL2 minimum. Login.gov integration. Phishing-resistant second factor options. Non-negotiable.

User Trust, Not User Friction

MFA had to feel like the app protecting the user — not the agency auditing them. Language, timing, and screen design all mattered.

Adoption Preservation

No spike in call center volume. No measurable drop in reporting completion. The security layer couldn't cost the product its users.

Why This Was Hard

The user base made every design decision higher stakes. SSI recipients skew older, lower-income, less digitally literate. Many are smartphone-only. Many have accessibility needs — screen readers, motor disabilities, vision loss. An MFA flow that works for a tech-comfortable user can completely break for someone who doesn't know what a one-time passcode is.

The design had to work for the hardest user, or it didn't work at all.

Design constraint that drove everything: The MFA experience had to be comprehensible to someone encountering two-factor authentication for the first time, on a prepaid smartphone, with a limited data plan, under cognitive load. If it cleared that bar, it cleared every bar above it.

03Users & Constraints

I synthesized federal data from the FCC, NTIA, GAO, and Pew Research to map the real access landscape for SSA's beneficiary population. Understanding who was actually using this app — and on what — shaped every design decision.

Who's Reporting Wages

Persona distribution visualization showing four user segments: smartphone-only, limited digital literacy, low-bandwidth, and accessibility needs

Persona distribution across four primary user segments · Click to view full size

Persona Context & Constraints MFA Design Implications
Smartphone-Only Users 27% of low-income adults rely solely on mobile for internet access. No fallback device. SMS OTP must be primary option. Authenticator app as secondary. No desktop-only recovery paths.
Limited Digital Literacy Lower comfort with abstract security concepts. "Verification code" language causes confusion. Plain-language prompts. Explain what a code is, where to find it, what to do with it. No jargon.
Low-Bandwidth Connectivity Rural and tribal areas. Prepaid plans with limited data. SMS delivery delays are real. Resend code with clear timer. Multiple delivery options. Lightweight payloads only.
Accessibility Needs Screen reader users, motor disabilities, age-related vision loss. Fine-grained input is difficult. WCAG 2.2 AA at every auth step. Large tap targets. Auto-submit on code entry where possible.

Key Constraints

04Approach

Research That Grounded the Strategy

Before touching wireframes, I needed to understand what comparable federal apps got right and wrong with authentication — and what the data actually said about this population's device and connectivity constraints.

Federal Data Synthesis

FCC, NTIA, GAO, and Pew data mapped the broadband and device landscape for low-income populations. 27% smartphone-only. Significant rural coverage gaps. Prepaid plan limitations on SMS reliability.

Competitive Benchmarking

Evaluated VA Health, IRS2Go, USCIS myUSCIS, and SSA's own eBenefits against Nielsen heuristics, WCAG 2.2, and auth flow patterns. Login.gov emerged as the strongest foundation.

Stakeholder Interviews

Structured interviews with SSA field office staff, policy experts, IT security, and advocacy organizations. Surfaced operational constraints and the specific fears driving stakeholder resistance to MFA.

Five Insights That Shaped the MFA Design

User research synthesis infographic showing key findings across population segments, device access, and authentication failure modes

Research synthesis · Population segments, device access, and authentication failure modes · Click to view full size

Four Design Principles

These governed every subsequent decision — authentication flow, form architecture, error states, and recovery paths.

Friction That Feels Earned

Security steps aren't friction when users understand why they exist. Frame MFA as the app protecting their data — their benefits, their reporting record. Make the reason visible before the ask.

One Decision at a Time

Single-question-per-screen architecture throughout. Users with limited digital literacy abandon when confronted with multi-field forms. The step counter makes progress visible and escape feel less necessary.

Accessible by Default

WCAG 2.2 AA baked into every component — including auth screens. Not retrofitted. Semantic HTML, keyboard-first navigation, screen reader optimization built before visual polish.

Recovery That Stays Mobile

Every failure state — locked account, expired code, unrecognized device — resolves on the phone. No desktop fallback. No "visit your local field office." Complete on the device the user has.

05Solutions & Design

The MFA Flow: Designed to Feel Expected

The authentication flow was built on Login.gov's identity infrastructure with a purpose-designed wrapper for the wage reporting context. The goal: users should feel like verification is a natural part of the process — not a checkpoint they didn't expect.

The positioning shift that changed the design: Every MFA prompt was preceded by a single line of context — "We need to verify it's you before you submit your wages." One sentence. Tested consistently as the difference between users proceeding and users abandoning.

Before & After: Legacy Process vs. New Flow

Step Legacy Phone/Paper Process New Mobile Flow
1 Call SSA during business hours Open app (24/7 availability)
2 Wait in queue (avg. 30+ min) Login.gov authentication with contextual MFA prompt
3 Verbally report wages to agent Step-by-step wage entry (single question per screen)
4 Agent manually enters data Data validation & pre-submission review
5 No confirmation receipt Instant confirmation with receipt number and next steps
6 Wait 5–10 business days for processing Real-time processing status

Redesigned flow reduces completion time from 35+ minutes to ~5 minutes, with 24/7 availability and immediate confirmation.

Authentication Flow Architecture

Wage reporting and password recovery flow diagram showing Login.gov MFA integration, step-by-step wage entry, and error recovery paths

Wage reporting and password recovery flow · Login.gov MFA integration, error recovery paths, and offline states · Click to view full size

Wireframe Flow: 14-Screen Mobile Architecture

SSA Mobile Wage Reporting wireframe slideshow showing 14 screens including MFA flow, wage entry steps, and confirmation

14-screen mobile flow · MFA authentication through wage submission · Click to open interactive slideshow

State Model: What the System Communicates at Every Step

A clear state model was required for every screen the user encounters — especially auth states, which are the highest-anxiety moments in the flow. Ambiguity at an auth screen reads as the app breaking.

Verification Pending

Code sent. Clear explanation of where to find it. Visible timer. Resend option available.

Entering Data

Step counter visible. Back navigation preserves data. One question, one screen.

Review & Confirm

All collected data displayed. Editable fields. Clear Submit and Go Back options.

Submitting

Loading state with estimated wait. Cancel available. Double-submission prevented.

Success

Confirmation with receipt number, timestamp, and next steps. Submitted data viewable.

Error (Recoverable)

Plain-language error explanation. Original data preserved. Clear retry path. No dead ends.

State model visual showing all application states from authentication through submission confirmation and error recovery

Complete state model · Authentication through submission, including error and offline states · Click to view full size

Trust, Transparency & Compliance

Trust and transparency design pattern matrix showing data disclosure, error prevention, and accessibility standards applied across the wage reporting flow

Trust and transparency pattern matrix · Data disclosure, error prevention, and accessibility standards across the flow · Click to view full size

Data Disclosure

Every screen discloses what data is being collected and why. Pre-submission review shows everything with the ability to edit before committing.

Error Prevention

Real-time validation catches missing or invalid entries before submission. Plain-language errors explain the issue and provide the fix — not just a red border.

Accessibility as Infrastructure

Recommended shared accessibility component library enforcing WCAG 2.2 AA at the component level — screen reader optimization, semantic landmarks, dynamic text scaling.

Constraints Diagram

Constraints diagram mapping competing pressures across accessibility, compliance, legacy integration, and operational requirements

Constraint map · Accessibility, compliance, legacy systems, and operational requirements in tension · Click to view full size

06Outcomes

Compliance Met. Adoption Preserved. Stakeholder Concern Resolved.

The strategy and design artifacts advanced the wage reporting app to prototype validation. Research was adopted as the foundation for SSA's mobile product roadmap. The MFA implementation addressed the compliance gap without triggering the adoption collapse stakeholders had anticipated.

~40%
Abandonment Reduction (Target)
~30%
Processing Delay Reduction (Est.)
6
Research Artifacts Delivered
Prototype
Validation Stage Reached

What This Produced

Product Roadmap Foundation

Strategy and research artifacts adopted as the foundation for SSA's mobile product roadmap. The wage reporting app concept advanced to prototype validation with stakeholder alignment on the MFA approach.

Policy Influence

Underserved-population research cited in internal policy discussions on digital equity and service delivery modernization. Influenced broader federal UX strategy for benefits-adjacent applications.

Accessibility Patterns

Established accessibility-first design patterns and component library recommendations that could scale across SSA's digital services — addressing years of compliance debt at the system level.

Cross-Functional Alignment

Synthesized competing stakeholder concerns — policy, compliance, technology, field operations — into coherent product strategy with documented trade-offs. Converted the MFA-as-threat framing into MFA-as-trust-signal.

AI Roadmap: What Comes Next

The wage reporting system has a clear path toward intelligent assistance — form guidance, proactive error prevention, accessibility enhancements, and predictive support for high-risk reporting periods.

2025–2026 AI enhancements roadmap showing intelligent form assistance, proactive error prevention, accessibility improvements, and predictive support features

AI enhancement roadmap · Intelligent assistance, proactive validation, and predictive support · Click to view full size

07Reflection

The Real Design Problem Was a Framing Problem

"The hardest part of this project wasn't the MFA flow. It was making stakeholders understand that MFA doesn't have to feel like punishment. If it does, that's a design failure, not a compliance requirement."

Why the stakeholder fear was legitimate: Federal apps that implement authentication as an afterthought do see drop-off. The concern wasn't irrational — it was based on real patterns in comparable products. The job was to design an exception to that pattern, not dismiss the concern.

Key Decisions and Reasoning

Login.gov over SSA-native auth: Login.gov already had mobile-optimized MFA flows, accessible component libraries, and established user trust in the federal context. Building SSA-native would have reinvented infrastructure that already existed and passed compliance review. Leverage what works.

SMS OTP as primary, not biometric: Biometric authentication is faster and lower-friction for users who have it. But biometrics require device capability and user setup. For a population where many are on older prepaid devices, SMS was the only option with universal reach. Design for the hardest case first.

Contextual framing before every auth step: One sentence of explanation — "We need to verify it's you before you submit your wages" — consistently tested as the difference between users continuing and users dropping. Security prompts without context read as the app malfunctioning. Context is a design component.

Keeping recovery paths mobile-complete: Every locked-account or expired-code state resolves on the phone. No desktop fallback. No field office visit. For smartphone-only users, that isn't a convenience — it's whether the recovery path exists at all.

What I'd Do Differently

The stakeholder resistance to MFA would have been shorter-lived if I'd led with comparable examples earlier — specifically federal apps that had navigated the same tension successfully. The research existed. The conversation about framing authentication as trust-building rather than friction could have happened weeks earlier than it did.

I'd also have pushed for a small-scale pilot test with the contextual framing variation before the broader prototype validation. The "verify it's you" sentence was discovered through usability testing; it could have been a hypothesis that entered the design earlier.

What This Project Shows

Interactive Prototypes

SSA Mobile Wage Reporting App Prototype

Two complete mobile prototypes demonstrating the end-to-end user journey — Login.gov MFA integration, password recovery, and the full wage reporting task flow.

Password: ENTER

SSA Mobile Wage Reporting App prototype showing Login.gov MFA flow, step-by-step wage entry, and confirmation screen on iPhone 16 Pro Max

Interactive prototype · Login.gov MFA through wage submission · Click to open in new window