Are you optimizing the UX of your fintech sufficiently?

April 18, 2024
How fintechs can optimize the user experience without compromising security

A poorly optimized user journey is like telling your customers to flee and never come back.

Users are constantly asked to provide passwords, identifiers, security codes, facial recognition, etc.

Adding even more frustration can be fatal for your business.

We know that fintechs need to maintain a sufficient degree of security to prevent customers from being impersonated, while keeping the user journey smooth and frictionless.

This is no small feat, because if certain steps in the login process encounter bugs and drag on, users will feel frustrated and may give up along the way, or even never use the service again.

It's a big challenge: How do you make a fintech both safe and simple? This requires real teamwork, especially on the part of the Product Manager, who has the difficult task of harmonizing teamwork to develop a product that meets the needs of users.

What are the security requirements in fintechs?

The user, in order to connect to his account, must go through several steps to confirm that he is who he says he is.

These identity verification steps are becoming more and more stringent as fraudsters are becoming smarter. It can be tempting to simplify procedures as much as possible to make the service less frustrating, while neglecting safety.

This is a risky bet, as a simple code will not be enough to discourage fraudsters and exposes the customer, as well as the integrity of their funds, to a major risk.

User experience challenges in fintechs

  • Authentication is becoming more and more stringent: methods like two-factor authentication (2FA) or multi-factor authentication (MFA), while effective in increasing security, introduce additional steps into the login process, generating friction for the user.

  • Failed authentication attempts: they require the user to repeat the same steps, often because the technology is not efficient enough.

  • The mix of authentication methods can confuse the user: The diversity of options (SMS, email, authentication applications, authentication applications, physical security keys, biometric recognition) can confuse those less comfortable with technology.

  • Accounts blocked in case of an authentication error: If the authentication is inaccurate, it can also lead to errors and prevent a user from accessing their accounts. This can lead to disastrous business consequences, such as negative reviews, bad advertising, unsubscriptions, and complaints.

How can the Product Manager improve the user experience in a fintech?

  • Use advanced technologies : the use of new technologies, such as artificial intelligence or biometric recognition behavioral, can help you create more fluid and non-intrusive authentication methods.

  • Focus on the speed and fluidity of the journey : users want interactions that are fast and uninterrupted. Bugs or slow loading can lead to user frustration or even disengagement. Choose authentication technologies that process quickly.

  • Make your solution simple and fun : Authentication processes should be intuitive and easy to understand, even for novice users. Do not hesitate to guide the user through each step, or even add definitions that specify the purpose.

  • Avoid failed attempts as much as possible : authentication must be reliable and work with the minimum number of flaws. Technical issues can not only cause frustration but can also reduce trust in the tool. To do this, choose authentication solutions that are recognized for their high success rate.

  • Be transparent every step of the way : clearly explain to users why certain personal information is requested and how they will be used and stored.

  • Personalize identification: offering options for users to choose their preferred authentication method can improve the overall experience. The ideal would be a customizable solution with several possible authentication methods adapted to each use case.

  • Deliver immediate returns : clear and immediate feedback must be provided during the authentication process to guide and reassure the user, especially in case of failure.

Examples:

Our solution was designed to provide an optimal user experience for fintech users. AI-guided onboarding and reauthentication with a simple smile.

Accompanied by the best experts in document fraud from the Gendarmerie Nationale, ShareID provides a strong and compliant authentication solution that allows secure identity verification.

Our particularity is our method of managing and securing the personal and biometric data of our users. In fact, we never store data and thus avoid any risk of theft or possible alteration of your personal data.

Contact us today to find out more about our strong authentication solutions.

Are you optimizing the UX of your fintech sufficiently?

RéglementationExigence cléRéponse ShareIDRésultat pour vous
DSP2 – Directive (UE) 2015/2366 + RTS SCA (UE 2018/389) Source DSP2 : Directive (UE) 2015/2366Authentification forte du client (SCA) obligatoire (art. 97) avec lien dynamique (art. 5 RTS) et indépendance des facteurs (art. 9 RTS).- Full IDV : authentification du document d’identité + biométrie (détection du vivant) - MFA 3.0: Ré-authentification forte basée sur l’identité Full IDV + MFA 3.0Conformité immédiate SCA ; fluidité pour l’utilisateur, sécurité renforcée.
DSP3 / Payment Services Regulation (projet) Source RTS SCA : Règlement délégué (UE) 2018/389 Entrée en vigueur prévue en 2025/ 2026.Articles 85–89 : consolidation de la SCA, règles d’accessibilité, clarification des exemptions.- Full IDV : authentification du document d’identité + biométrie (détection du vivant) - MFA 3.0: Ré-authentification forte basée sur l’identité Solution déjà alignée sur les parcours biométriques & exemptions. MFA 3.0Anticipez les évolutions futures sans refonte lourde.
DORA – Règlement (UE) 2022/2554 Source DORA : Règlement (UE) 2022/2554Authentification forte pour protéger les systèmes et les données critiques (art. 9(4)(d)), encadrement strict des prestataires de Technologie de l’information et de la communication (art. 28–30).- MFA 3.0: Ré-authentification forte basée sur l’identité. Intégrable via SDK/API (iOS, Android, Web), traçabilité complète. MFA 3.0Sécurisation des systèmes d’informations critiques, conformité démontrable aux superviseurs.
eIDAS (UE 910/2014) + implémentation 2015/1502 Source eIDAS (2014) : Règlement (UE) 910/2014Niveaux simple / substantiel / élevé ; multi-facteurs encouragés pour les niveaux substantiel et élevé.Authentification des documents + biométrie (détection du vivant). Full IDVValeur probante proche d’un contrôle présentiel.
eIDAS 2 – Règlement (UE) 2024/1183 Source eIDAS 2 : Règlement (UE) 2024/1183Les EUDI Wallets devront fonctionner à un niveau d’assurance élevé, avec partage sélectif d’attributs.- MFA 3.0: Ré-authentification forte basée sur l’identité Intégrable via SDK/API (iOS, Android, Web), traçabilité complète. MFA 3.0Intégration fluide des futurs portefeuilles européens.
MiCA – Règlement (UE) 2023/1114 Source MiCA : Règlement (UE) 2023/1114Les prestataires de services sur crypto-actifs doivent appliquer les obligations KYC/AML (Directive 2015/849) ; art. 76 impose CDD (renforcement de la vigilance client) renforcé pour certaines plateformes.Authentification des documents + biométrie (détection du vivant) = anti-deepfake et anti-spoofing. Doc IDV ou Full IDVRéduction drastique des fraudes, conformité crypto-AML.
ETSI TS 119 461 (V2.1.1, 2025) Source ETSI TS 119 461 : Norme européenneVérification d’identité à distance : 5 étapes (initiation → collecte → validation → liaison → résultat). Liveness et anti-spoofing obligatoires pour les parcours à distance.- Enrôlement complet : authentification des documents + Biométrie (détection du vivant) - Algorithmes entraînés sur une base de données de vrais et de faux documents de la Gendarmerie Nationale. Full IDVEnrôlement KYC robuste, valeur probante reconnue.
FIDA – Financial Data Access (projet) Source FIDA (proposition) : Commission européenneConsentement explicite, traçable et révocable via des tableaux de bord.- MFA 3.0: Authentification forte basée sur l’identité au moment du consentement + réauthentification fluide avec un simple sourire. MFA 3.0Accès aux données conforme et centré utilisateur.
RGPD – Règlement (UE) 2016/679 Source RGPD : Règlement (UE) 2016/679Durée de maintien de données chez ShareID paramétrable. Aucun stockage biométrique : hachages homomorphiques brevetés , ISO 27001.Image de marque, risque réglementairejuridique réduit, confiance accrue des régulateurs et clients.



← Tous les articles