Passwordless Login

Uthentic has reimagined the sign-up and log in workflows. Legacy password-based login systems are now obsolete. Not sure what you are missing? Here we will provide a comparison between Uthentic's reimagined passwordless login and legacy systems still used across the web. We've broken this article down into two parts:

Improved User Experience

The charts below demonstrate the clear advantage of passwordless login. We compare three different scenarios that users are likely to face when navigating the web, and break down the steps the user has to take with a legacy system vs passwordless login.


The first step that a user will take to become a member of a website is signing up for an account. Legacy systems force users to create and manage passwords, in addition to verify they own the email address they provided. Uthentic passwordless login skips painful passwords and leverages the user's email to log in and validate their email in the same step.

10 steps
  1. Enter email address
  2. Think up a password
  3. Enter password
  4. Confirm password
  5. Write down password
  6. Enter name
  7. Check email, click link
  8. Return to site
  9. Enter email address
  10. Enter password
Uthentic Passwordless Login
4 steps
  1. Enter email address
  2. Enter name
  3. Check email, click button
  4. Return to site
Return visit, 3 weeks later

In this scenario, a user signs up for a site, but does not return for 3 weeks. Three weeks is a short enough time span that they are likely to remember where they stored their password for a legacy system. Uthentic shines here - by storing a token on the user's device, Uthentic automatically verifies the token in the background and logs the user in with no action needed by the user.

3 steps
  1. Enter email address
  2. Look up password
  3. Enter password
Uthentic Passwordless Login
No user action required
  1. Device recognized, token verified, user automatically logged in
Return visit, 1 year later

Another all-too-common scenario is when a user signs up for a website, but disappears for an entire year before coming back. In this case, users are very unlikely to remember their password - or even be able to remember where they stored their password. They will guess a few times, and then resort to resetting their password via their email inbox.

Once again, Uthentic passwordless login obliterates the old model. The user's token is expired with them being away for so long, but we still know who they are. They are prompted to check their email and click the sign-in button. Done.

14 steps
  1. Enter email address
  2. Look up password
  3. Can't find password
  4. Guess password, wrong
  5. Guess password, wrong
  6. Guess password, wrong
  7. Click password reset link
  8. Enter email address
  9. Check email, click link
  10. Create new password
  11. Write down password
  12. Return to login screen
  13. Enter email address
  14. Enter password
Uthentic Passwordless Login
2 steps
  1. Device recognized, token expired, email pre-filled
  2. Check email, click link
  3. Return to site

Improved Security

Passwords are insecure

There are numerous ways in which passwords are inherently insecure. Uthentic solves all of these security issues by bypassing passwords altogether.

Email is the final authentication authority anyway

Every password-based login system on the web also has a way to reset your password - they send you a link in an email. If you can access your account this way anyway, why are we still using insecure password as a way into your account? Uthentic just skips the insecure (and painful) password piece of the puzzle.

Uthentic is optimized for security

We've built Uthentic around security from the ground up.