User authentication methods
At least one user authentication method is offered that does not rely on a user's ability to:
[This replaces part of the following original proposed SC:
[When there is a barrier between the content and the user that requires additional abilities an alternative is provided that does not require additional abilities.]
[Additional abilities include cognitive functions that are required, but are not necessary to achieve the main task for which the content was designed. Such as:]
Exception: There is an exception when there is a not a known alternative that provides the same main function and does not rely on additional abilities. A known alternative can be a WCAG technique, W3C note, or in the documentation of the platform.]
AA
None?
This topic is directly related to Principle 2 "Operable", as failure
to successfully overcome the user authentication barriers will mean
that the user is unable to access and make use of the underlying
content.
The intent of the SC is to ensure that, if a user is able to make use of the content that they are seeking, they do not encounter a barrier that prevents them from accessing it.
Most user interfaces are designed to help users complete tasks. However, web security and privacy technologies intentionally introduce barriers to task completion. They require users to perceive more and to do more to complete tasks.
Many of the user authentication methods rely on trying to
differentiate between a human and software that tries to hijack the
user's identity (robots). The most common way to try to distinguish
this is to present a task that a human can "easily" do and that is
almost impossible for software to reproduce. Setting tasks that rely on
human abilities is the most common way to try to make this distinction.
These methods can frequently be quite challenging for people who have a
high level of the relevant ability. For people who have a lower level
of the relevant ability the authentiation task frequently presents an
insurmountable barrier.
The six abilities that are referred to in the SC are those that are
frequently employed as user authentication methods. The SC asks for the
availability of at least one method that does not rely on any of these
abilities to be offered.
Users will be able to successfully complete a user authentication procedure even though they have limited levels of those cognitive abilities specified in the SC.
Resources are for information purposes only, no endorsement implied.
Relevant resources:
Relevant issue papers:
Inspection of the set of user authentication methods offered by the web service to see whether one that does not involve the six specified human abilities.
TBD. Methods would include automatic user authentication based on
the use of a trusted device (to which the user has already logged in
with their own identity).