Flexible Security For Your Peace of Mind

Self-service adoption best practices

(Last updated on March 29, 2019)

If you have decided to implement a self-service password reset solution, you are one step closer to increasing user productivity, and reducing password management costs. However, rolling out the solution is only half the battle – user adoption is what drives your password reset program success. Here are five tips to manage change and ensure user adoption.

Create a communication plan

Create an internal communication plan for making the implementation process transparent and timelines clear. Both your stakeholders and end-users should know what they can expect. Your communication plan should answer:

  • What is the new solution
  • How users can benefit from it
  • Who is expected to use it (and why)
  • When will it be launched
  • Where and how they can enroll

Prepare the helpdesk

Your organization may experience a spike in password reset calls following the solution rollout. The helpdesk plays an important part in driving user adoption. Train your helpdesk to resist the temptation to reset user passwords. Instead, they should direct users to the new platform. Prepare the helpdesk for increased support during the initial period until users are enrolled with the system.

Sell the benefits of self-service

Users will only change their behavior when they have a good reason to do so. Highlight the benefits that will make their lives easier. Whether its 24-7 availability, or managing their own password from mobile and desktop, it’s important that they know the service will save them the hassle of calling the helpdesk.

Set realistic expectations for user adoption

User adoption is a process, not an event. Don’t expect to achieve a 100% adoption overnight. People are busy and reluctant to change. You will need to send them regular reminders that enrollment is mandatory. Point them to training resources and continue to check in with them to see how they are using the solution. Consider using pop-ups and un-closeable browsers that will take over their desktop screen until they enroll.

Train users

The solution may be simple, but not all your users are created equal. Make it easy for users to learn at their own pace, or refresh their memory by giving them access to training materials, videos, and guides.

The tips above will help you identify and address adoption challenges. To streamline the process, you will want built-in solution features that drive adoption. Look for a self-service password reset tool with pre-enrollment and administrator-enrollment options that allow you to use existing Active Directory data to automatically enroll users. If enrollment is still required, you can use high-impact communication methods such as emails and SMS messages to ensure users receive your reminders.

  • Was this Helpful ?
  • Yes   No

Tags: ,

Back to Blog

Related Articles

  • 3 reasons why users aren’t using the Password Reset solution

    Often times when you introduce a new solution in the workplace, you are faced with user resistance. Resistance towards a new self-service password reset solution forces helpdesk staff to continue taking password reset calls, and distracts them from more important tasks. To address the user adoption problem, you need to identify all the barriers that prevent…

    Read More
  • Addressing user adoption challenge in K12 with auto-enrollment

    Given the amount of social media accounts students have these days, the day will come where one of those passwords is forgotten. Unfortunately, that will likely be the password associated with their student account, perhaps after spring break. When this occurs, the student will likely contact the teacher, who in turn will reach out to…

    Read More
  • Security questions – authenticating with your worst kept secrets

    Knowledge based authentication (KBA) is a form of identity verification with secrets only known by the user. Passwords and security questions are the most common forms of KBA. Their familiarity means that they are the primary use case for many authentication systems. We’ve already illustrated the inherent weakness of passwords in previous blogs. In this…

    Read More

© 2019 Specops Software. All rights reserved. Privacy and Data Policy