Understanding Accessible Authentication

Status

This understanding document is part of the draft WCAG 2.2 content. It may change or be removed before the final WCAG 2.2 is published.

Accessible Authentication Success Criteria text

AA

If an authentication process relies on a cognitive function test, at least one other method must also be available that does not rely on a cognitive function test.

Cognitive function test definition

A task that requires the user to remember, manipulate, or transcribe information. Examples include, but are not limited to:

Remembering your own name, email address, or phone number is not considered a cognitive function test.

Intent of Accessible Authentication

The purpose of this success criterion is to ensure there is an accessible, easy-to-use, and secure method to log in and access content. Most web sites rely on usernames and passwords for logging in. Memorizing a username and password (or transcribing it manually) places a very high or impossible burden upon people with certain cognitive disabilities.

Cognitive function tests are known to be problematic for many people with cognitive disabilities. Whether it is remembering random strings of characters, a pattern gesture to perform on a touch screen, or identifying which images include a particular object, this form of test will exclude some people. When a cognitive function test is used, at least one other authentication method must be available which is not a cognitive function test.

Web sites can employ username (or email) and password inputs as an authentication method if it meets Success Criterion 1.3.5 Input Purpose and password managers / browser functionality is not blocked. When properly marked up, browser features or password managers can save the user’s information and refill the login.

If there is more than one step in the authentication process, such as with multi-factor authentication, all steps should comply with this success criterion. There should be a path through authentication that does not rely on cognitive function tests.

Copy and paste can be relied on to avoid transcription. Examples of this are password managers automatically filling in username and passwords, or web-based command line interfaces asking for a password that can be copied from a local source. Blocking people or programs from pasting into authentication fields, or using a different format between the copied text and the input field, would force the user to transcribe information and therefore fail this criterion.

Benefits of Accessible Authentication

People with cognitive issues relating to memory, reading (e.g. dyslexia), numbers (e.g. dyscalculia), or perception-processing limitations will be able to authenticate irrespective of the level of their cognitive abilities.

Examples of Accessible Authentication

Techniques for Accessible Authentication

Sufficient Techniques for Accessible Authentication

  1. Email link authentication
  2. @@ Providing a properly marked up email and password inputs.
  3. @@ Providing WebAuthn as an alternative to username/password.
  4. @@ Providing a 3rd party login using oAuth.
  5. @@ Using two techniques provide 2 factor authentication.

Additional Techniques (Advisory) for Accessible Authentication

Failures for Accessible Authentication

Resources