Keywords: Federal UX, Government Services, SSA, Mobile App Design, Accessibility, WCAG 2.2, MFA, Multi-Factor Authentication, Login.gov, UX Research, User-Centered Design, Service Design, Federal Services, Benefits Administration, Prototyping, Figma, Section 508, Compliance UX, Stakeholder Management.
Implemented MFA for a federal wage reporting app serving 70M+ SSA beneficiaries — without triggering the adoption collapse stakeholders feared. The real problem wasn't the security requirement. It was convincing users that the app still trusted them.
Role: Senior UX Designer & Strategist
Team: 8-person cross-functional · product, engineering, policy, compliance
Scope: Mobile app + responsive web · iOS · Android
Agency: Social Security Administration (SSA)
Timeline: 2023–2024
SSI recipients are required to report monthly wages to the Social Security Administration. The existing process was paper-based and phone-dependent — 35+ minutes per call, no confirmation receipt, processing delays that generated overpayments and incorrect benefit calculations. The app's job was simple: make wage reporting something people could do in five minutes on their phone.
The app existed. It worked. And it had no multi-factor authentication.
Federal identity and authentication mandates — NIST SP 800-63B, OMB M-22-09 — required MFA for any system handling benefit or financial data. The wage reporting app was out of compliance. That gap had to close.
NIST 800-63B and OMB M-22-09 required MFA for all federal systems handling financial or benefits data. The SSA MWR app was out of compliance. There was no path around it.
Product and operations teams were convinced MFA would tank adoption. Users would hit the friction wall and revert to calling. Every gain the app had made would disappear.
This wasn't a feature debate. MFA failure meant regulatory exposure for the agency and real harm for beneficiaries — missed reporting windows, overpayment clawbacks, interrupted benefits.
Implement MFA with enough rigor to meet federal standards without making users feel like the system didn't trust them. Reduce perceived friction while maintaining real security.
The core tension wasn't technical. Stakeholders were convinced that adding MFA would trigger the exact failure mode the app was built to prevent: users abandoning digital reporting and going back to the phone. They saw security as the enemy of adoption.
That framing was wrong, but it was grounded in a real pattern. Federal apps that bolt on authentication as an afterthought see drop-off. The question wasn't whether MFA creates friction — it does. The question was whether the friction had to feel adversarial.
The stakeholder argument: "If users hit a verification wall every time they open the app, they'll call instead. MFA undoes everything we built."
The actual problem: That's only true if MFA is designed like a checkpoint. Design it as part of the natural flow, and users don't experience it as friction — they experience it as the app taking their data seriously.
NIST 800-63B AAL2 minimum. Login.gov integration. Phishing-resistant second factor options. Non-negotiable.
MFA had to feel like the app protecting the user — not the agency auditing them. Language, timing, and screen design all mattered.
No spike in call center volume. No measurable drop in reporting completion. The security layer couldn't cost the product its users.
The user base made every design decision higher stakes. SSI recipients skew older, lower-income, less digitally literate. Many are smartphone-only. Many have accessibility needs — screen readers, motor disabilities, vision loss. An MFA flow that works for a tech-comfortable user can completely break for someone who doesn't know what a one-time passcode is.
The design had to work for the hardest user, or it didn't work at all.
Design constraint that drove everything: The MFA experience had to be comprehensible to someone encountering two-factor authentication for the first time, on a prepaid smartphone, with a limited data plan, under cognitive load. If it cleared that bar, it cleared every bar above it.
I synthesized federal data from the FCC, NTIA, GAO, and Pew Research to map the real access landscape for SSA's beneficiary population. Understanding who was actually using this app — and on what — shaped every design decision.
| Persona | Context & Constraints | MFA Design Implications |
|---|---|---|
| Smartphone-Only Users | 27% of low-income adults rely solely on mobile for internet access. No fallback device. | SMS OTP must be primary option. Authenticator app as secondary. No desktop-only recovery paths. |
| Limited Digital Literacy | Lower comfort with abstract security concepts. "Verification code" language causes confusion. | Plain-language prompts. Explain what a code is, where to find it, what to do with it. No jargon. |
| Low-Bandwidth Connectivity | Rural and tribal areas. Prepaid plans with limited data. SMS delivery delays are real. | Resend code with clear timer. Multiple delivery options. Lightweight payloads only. |
| Accessibility Needs | Screen reader users, motor disabilities, age-related vision loss. Fine-grained input is difficult. | WCAG 2.2 AA at every auth step. Large tap targets. Auto-submit on code entry where possible. |
Before touching wireframes, I needed to understand what comparable federal apps got right and wrong with authentication — and what the data actually said about this population's device and connectivity constraints.
FCC, NTIA, GAO, and Pew data mapped the broadband and device landscape for low-income populations. 27% smartphone-only. Significant rural coverage gaps. Prepaid plan limitations on SMS reliability.
Evaluated VA Health, IRS2Go, USCIS myUSCIS, and SSA's own eBenefits against Nielsen heuristics, WCAG 2.2, and auth flow patterns. Login.gov emerged as the strongest foundation.
Structured interviews with SSA field office staff, policy experts, IT security, and advocacy organizations. Surfaced operational constraints and the specific fears driving stakeholder resistance to MFA.
Research synthesis · Population segments, device access, and authentication failure modes · Click to view full size
These governed every subsequent decision — authentication flow, form architecture, error states, and recovery paths.
Security steps aren't friction when users understand why they exist. Frame MFA as the app protecting their data — their benefits, their reporting record. Make the reason visible before the ask.
Single-question-per-screen architecture throughout. Users with limited digital literacy abandon when confronted with multi-field forms. The step counter makes progress visible and escape feel less necessary.
WCAG 2.2 AA baked into every component — including auth screens. Not retrofitted. Semantic HTML, keyboard-first navigation, screen reader optimization built before visual polish.
Every failure state — locked account, expired code, unrecognized device — resolves on the phone. No desktop fallback. No "visit your local field office." Complete on the device the user has.
The authentication flow was built on Login.gov's identity infrastructure with a purpose-designed wrapper for the wage reporting context. The goal: users should feel like verification is a natural part of the process — not a checkpoint they didn't expect.
The positioning shift that changed the design: Every MFA prompt was preceded by a single line of context — "We need to verify it's you before you submit your wages." One sentence. Tested consistently as the difference between users proceeding and users abandoning.
| Step | Legacy Phone/Paper Process | New Mobile Flow |
|---|---|---|
| 1 | Call SSA during business hours | Open app (24/7 availability) |
| 2 | Wait in queue (avg. 30+ min) | Login.gov authentication with contextual MFA prompt |
| 3 | Verbally report wages to agent | Step-by-step wage entry (single question per screen) |
| 4 | Agent manually enters data | Data validation & pre-submission review |
| 5 | No confirmation receipt | Instant confirmation with receipt number and next steps |
| 6 | Wait 5–10 business days for processing | Real-time processing status |
Redesigned flow reduces completion time from 35+ minutes to ~5 minutes, with 24/7 availability and immediate confirmation.
Wage reporting and password recovery flow · Login.gov MFA integration, error recovery paths, and offline states · Click to view full size
14-screen mobile flow · MFA authentication through wage submission · Click to open interactive slideshow
A clear state model was required for every screen the user encounters — especially auth states, which are the highest-anxiety moments in the flow. Ambiguity at an auth screen reads as the app breaking.
Code sent. Clear explanation of where to find it. Visible timer. Resend option available.
Step counter visible. Back navigation preserves data. One question, one screen.
All collected data displayed. Editable fields. Clear Submit and Go Back options.
Loading state with estimated wait. Cancel available. Double-submission prevented.
Confirmation with receipt number, timestamp, and next steps. Submitted data viewable.
Plain-language error explanation. Original data preserved. Clear retry path. No dead ends.
Complete state model · Authentication through submission, including error and offline states · Click to view full size
Trust and transparency pattern matrix · Data disclosure, error prevention, and accessibility standards across the flow · Click to view full size
Every screen discloses what data is being collected and why. Pre-submission review shows everything with the ability to edit before committing.
Real-time validation catches missing or invalid entries before submission. Plain-language errors explain the issue and provide the fix — not just a red border.
Recommended shared accessibility component library enforcing WCAG 2.2 AA at the component level — screen reader optimization, semantic landmarks, dynamic text scaling.
The strategy and design artifacts advanced the wage reporting app to prototype validation. Research was adopted as the foundation for SSA's mobile product roadmap. The MFA implementation addressed the compliance gap without triggering the adoption collapse stakeholders had anticipated.
Strategy and research artifacts adopted as the foundation for SSA's mobile product roadmap. The wage reporting app concept advanced to prototype validation with stakeholder alignment on the MFA approach.
Underserved-population research cited in internal policy discussions on digital equity and service delivery modernization. Influenced broader federal UX strategy for benefits-adjacent applications.
Established accessibility-first design patterns and component library recommendations that could scale across SSA's digital services — addressing years of compliance debt at the system level.
Synthesized competing stakeholder concerns — policy, compliance, technology, field operations — into coherent product strategy with documented trade-offs. Converted the MFA-as-threat framing into MFA-as-trust-signal.
The wage reporting system has a clear path toward intelligent assistance — form guidance, proactive error prevention, accessibility enhancements, and predictive support for high-risk reporting periods.
"The hardest part of this project wasn't the MFA flow. It was making stakeholders understand that MFA doesn't have to feel like punishment. If it does, that's a design failure, not a compliance requirement."
Why the stakeholder fear was legitimate: Federal apps that implement authentication as an afterthought do see drop-off. The concern wasn't irrational — it was based on real patterns in comparable products. The job was to design an exception to that pattern, not dismiss the concern.
Login.gov over SSA-native auth: Login.gov already had mobile-optimized MFA flows, accessible component libraries, and established user trust in the federal context. Building SSA-native would have reinvented infrastructure that already existed and passed compliance review. Leverage what works.
SMS OTP as primary, not biometric: Biometric authentication is faster and lower-friction for users who have it. But biometrics require device capability and user setup. For a population where many are on older prepaid devices, SMS was the only option with universal reach. Design for the hardest case first.
Contextual framing before every auth step: One sentence of explanation — "We need to verify it's you before you submit your wages" — consistently tested as the difference between users continuing and users dropping. Security prompts without context read as the app malfunctioning. Context is a design component.
Keeping recovery paths mobile-complete: Every locked-account or expired-code state resolves on the phone. No desktop fallback. No field office visit. For smartphone-only users, that isn't a convenience — it's whether the recovery path exists at all.
The stakeholder resistance to MFA would have been shorter-lived if I'd led with comparable examples earlier — specifically federal apps that had navigated the same tension successfully. The research existed. The conversation about framing authentication as trust-building rather than friction could have happened weeks earlier than it did.
I'd also have pushed for a small-scale pilot test with the contextual framing variation before the broader prototype validation. The "verify it's you" sentence was discovered through usability testing; it could have been a hypothesis that entered the design earlier.
Two complete mobile prototypes demonstrating the end-to-end user journey — Login.gov MFA integration, password recovery, and the full wage reporting task flow.
Password: ENTER