Forgot Password

🎯 Purpose

Assists users who have forgotten the password they set up for account access, providing a secure method to regain authentication capability.


📍 Context and Availability

  • Trigger Scenario: User cannot remember their authentication password
  • Screen Location: Password entry screen
  • Link Text: "Forgot your password? Click here"
  • User Situation: Password forgotten, account lockout due to failed attempts, or password confusion

🖥️ Password Recovery Interface

🔒 Link Presentation

The password recovery link appears contextually when users are prompted to enter their password:


🔄 Password Recovery Scenarios

🚨 Common Password Issues

IssueDescriptionRecovery Need
Forgotten PasswordUser cannot remember passwordPassword reset process
Account LockoutToo many failed password attemptsAccount unlock and password reset
Password ExpiredPassword beyond expiration periodPassword update requirement
Policy ChangesNew password policies not metPassword compliance update
Multiple PasswordsConfusion between different passwordsPassword clarification or reset

🔄 Recovery Process Flow

🆘 Password Recovery Initiation

  1. Link Click: User clicks "Forgot your password? Click here" link
  2. Context Capture: System records current authentication attempt
  3. Recovery Routing: User directed to appropriate recovery mechanism
  4. Identity Verification: Recovery process begins with identity confirmation

🛡️ Password Recovery Methods

Based on system configuration and user profile:

  • Security Questions: Knowledge-based authentication
  • Email Verification: Password reset via registered email
  • SMS Verification: Password reset via registered mobile number
  • IDV Process: Full identity verification through AR-IDV
  • Administrative Reset: Support-assisted password reset

🔒 Security Considerations

🛡️ Recovery Security Measures

  • Identity Verification Required: All password recovery requires identity confirmation
  • Multi-Factor Verification: Recovery uses alternative authentication methods
  • Secure Channels: Recovery communications use encrypted channels
  • Time Limitations: Recovery tokens have limited validity periods

📊 Recovery Verification Methods

MethodVerification TypeSecurity Level
Email OTPCode sent to registered emailMedium
SMS OTPCode sent to registered mobileMedium
Security Q&AKnowledge-based questionsMedium
Full IDVComplete identity verificationHigh
AdministrativeSupport-verified recoveryHigh

🎯 User Experience

🔄 Recovery Process Flow


📱 User-Friendly Features

  • Multiple Options: Various recovery methods available
  • Clear Guidance: Step-by-step recovery instructions
  • Progress Tracking: Users understand recovery progress
  • Immediate Use: New password immediately active

⚠️ Important Recovery Notes

🔐 Security Requirements

  • Verification Mandatory: Password recovery always requires identity verification
  • Secure Process: All recovery steps maintain security standards
  • Audit Trail: Complete logging of password recovery activities
  • Policy Compliance: New passwords must meet current policy requirements

🎯 Post-Recovery Actions

  • Immediate Authentication: New password immediately usable
  • Security Confirmation: User confirmation of successful password change
  • Additional Factors: Second-factor authentication still required
  • Account Security: Guidance on maintaining account security