Identity, IAM Technologies, Network Security

A New Identity: In defense of the end user

Credit: Adobe Stock

It was in the grocery checkout line that I knew the identity industry had lost the plot.

It wasn’t a zero-day exploit or a breach disclosure. It was me, holding up a line of grumpy shoppers, trying to save 75 cents on hummus. The store’s coupon app locked me out for suspicious activity. Apparently logging in from aisle six with a new IP address was a red flag. I had to reset my password, verify my identity, confirm via email, then re-verify via text, all while holding a tub of Sabra and praying my frozen peas didn’t melt.

It was at that moment I asked myself: If this is what modern identity management feels like for coupons, how are we surviving anything bigger?

[Never Miss SC Media's A New Identity column: Subscribe to the SC Identity Newsletter Now]

Despite what every identity executive on the Gartner keynote circuit tells us about the IAM renaissance we are in the midst of, we still do not live in a federated identity world that has united our digital selves into a single sign-on utopia.

Instead, we got reset links, SMS codes, token mismatches, session expirations, and help desk purgatory.

Let me tell you something that CISO’s won’t say on a keynote stage: Most people hate logging in. Hate it. It’s the daily CAPTCHA for your digital life. And yet, the IAM industry keeps acting like we’re one press release away from identity Shangri-La.

IAM was supposed to be a future of frictionless flows including biometric logins, unified identities, risk-aware access and zero trust wrapped in zero stress.

Reality bytes

In 2015, password resets cost an estimated $40–$50 a pop, often eating up nearly an hour of IT and user time. Today, that same reset averages $70 to $87 — but thanks to self-service portals, tickets are down 70% to 85%, saving $136 per user annually. Yet users still waste about 11 hours a year locked out.

According to a 2024 NordPass survey, the typical user juggles 168 personal passwords and 87 business passwords — totaling over 255 credentials to keep track of. But most reuse the same 30 or so passwords. So, while you may think your credentials are safe, hackers are basically doing credential bingo.

While progress has been made, the identity burden hasn’t gone away.

Good intentions gone awry

Behind the velvet ropes of the IAM elite, they’ll tell you, “Users are the weakest link.” They’re not trying to help a parent reset a Medicare password or juggle five work logins across two browsers and a VPN. They live in a FIDO-enabled paradise, where credentials are synced, devices are pristine, and no one ever loses a phone in an Uber.

Here’s where the contradictions become comedy:

  • Attackers from the “Scattered Spider” group impersonated employees and persuaded help desk staff to reset passwords (often using SIM‑swap tactics), compromising IT accounts at Marks & Spencer and the Co‑op.
    • Researchers at Obsidian Security revealed attackers leveraged Azure AD’s self‑service reset and SIM‑swap techniques to hijack accounts, showing how well‑intentioned convenience features can be weaponized. 
      • Former employee AWS credentials, still active five months post‑departure, were used to delete 456 VMs supporting WebEx Teams. The incident affected 16,000 users and caused $2.4M in damages. Cisco acknowledged that failure to immediately deprovision accounts was the root cause. 
      • These examples show that identity frustration isn’t just a user annoyance. They illustrate how IAM firms also needs to step up and do better to address social‑engineering weaknesses, support‑tool vulnerabilities (IAM provider breaches), feature‑turned‑vector (self-service password reset) exploits and lifecycle mismanagement (orphaned credentials) issues.

        So, let’s not pretend this is just a workplace or end-user challenge.

        An IAM platform by any other name…

        To be fair: The IAM world isn’t failing for lack of innovation. In 2015, “passwordless” was a punchline. In 2025, it’s at least plausible. Self-service tools are finally working. Risk scoring is catching bad actors faster. And lifecycle management (upcoming SC Media webinar plug) is no longer just an identity wonk’s hobby.

        But the IAM elite still design platforms for engineers, compliance officers, boardrooms and VCs. Not for the exhausted, overloaded, over-authenticated human beings on the other side of the screen.

        Users forget passwords. Devices die. Cookies expire. Help desks get phished. IAM is hard not because the math is hard, but because people are messy and systems don’t adapt fast enough. When vendors design for threat models instead of use cases, they end up locking out the people they’re meant to protect.

        Credential stuffing still works because password reuse is still common. Shadow IT persists because the sanctioned tools are too locked down. And self-service account recovery only works if you still have access to the email address you signed up with in 2017.

        A journey of a thousand miles

        IAM has come a long way. But it still has miles to go.

        So here’s my ask: Stop building IAM tools that work best for people who already know what OIDC and SAML mean. Start building for gig workers with 10 email addresses trying to login on a cracked iPad. Consider the economy-class employee trapped on a 10-hour transatlantic flight trying to authenticate on a phone with no service to access Google Workspace.

        The real risk isn’t just cyber criminals, end users or even well-meaning IAM providers. It's a mix of authentication fog, the tangle of competing solutions and the identity potholes not yet fixed. The bottom line: We’re not here yet.

        You want a win? Get to solving for enterprise users but also the frustrated electrician calling their bank on a weekend only to be told the third-party support rep “can’t unlock your debit card account.”

        Security isn’t just about keeping bad actors out. It’s about not locking good people out while you’re at it. And when that happens, that’s when we win. Not because identity became invisible. But because it finally became intelligible and less performative.

        When I can save 75 cents on hummus without feeling like I’m cracking into NORAD, that’s when I’ll know we finally figured out identity.

        [Never Miss SC Media's A New Identity column: Subscribe to the SC Identity Newsletter Now]

        An In-Depth Guide to Identity

        Get essential knowledge and practical strategies to fortify your identity security.
        Tom Spring, Editorial Director

        Tom Spring is Editorial Director for SC Media and is based in Boston, MA. For two decades he has worked at national publications in the leadership roles of publisher at Threatpost, executive news editor PCWorld/Macworld and technical editor at CRN. He is a seasoned cybersecurity reporter, editor and storyteller that aims always for truth and clarity.

        You can skip this ad in 5 seconds