How to Conduct User Testing with Credentials on Userlytics
When your study requires participants to log into an app or website using specific credentials, it's crucial to manage this securely and efficiently. The Userlytics platform provides a built-in feature for handling credentials, ensuring a smooth user experience, and safeguarding sensitive information. Here’s a guide on how to set up credentials.
Step 1: Preparing for Setup: To generate a set of credentials for your project, please provide the following information to your Account Manager or send it to operations@userlytics.com:
- A list of individual logins for each participant, formatted in an Excel or spreadsheet file (e.g., Username and Password).
- A buffer of 3x the number of users in case of participant drop-offs.
- Indicate whether the credentials can be reused by multiple users or if they are single-use only.
Step 2: Setup Process: Once you have provided the required information, the Operations team will:
- Set up the credentials and generate a testing URL.
- Share the URL with you for inclusion in your task instructions.
For example, you can define a task like: “Log in using the provided credentials and navigate to the dashboard.” The URL will appear in the format: www.userlytics.com/credentials/XXXXX.
Important Notes:
- If the credentials can be reused, our team will reset them when they are used up.
- If the credentials are single-use only, our team will notify you once all credentials have been utilized.
Step 3: Suggestions and Best Practices
When your study requires participants to log into an app or website using specific credentials, managing this securely and efficiently is essential. The Userlytics platform provides a built-in feature for handling credentials, ensuring a smooth user experience and safeguarding sensitive information.
Why Use Credentials?
- Testing gated content, member-exclusive features, or services requiring a login.
- Ensuring participants access the correct environment and data for meaningful insights.
Common Scenarios:
- Testing an online service with different user roles.
- Evaluating the user experience of a membership portal.
- Reviewing content behind a paywall.
Types of Credentials:
- Generic Credentials: Shared logins with limited permissions, used by all participants.
- Unique Credentials: Individual logins created for each participant, often with personalized data or permissions. In this case, provide at least three unique credentials per participant to account for drop-offs.
Best Practices:
- Security: Use temporary credentials with limited permissions, avoiding real user accounts or data.
- Instructions: Clearly explain how participants should use the credentials (e.g., pre-filled login or manual entry).
During the Session:
- Monitor login success and track issues, such as incorrect passwords or account lockouts.
- Consider adding a follow-up Success/Failure question after the login step. For participants who fail, use branching logic to gather feedback on challenges, such as, “What made you confused or hesitant?” or “What would make the process clearer?”
Post-Session Follow-Up:
- Reset or deactivate unique credentials immediately after the session to maintain security.