5 Ways to Balance User Productivity with Solid Authentication Protocols