What are the best practices for login page design?
-
In B2B, the login page design must be friction-light, trustworthy, and boring (on purpose).
-
Default to one column, identifier‑first (email/UPN → route). Use a second column only for co‑branding or required security bulletins.
-
Favor a secure login form UI that actually protects users (SSO, passkeys) over security theater. Follow NIST/OWASP, block breached passwords, rate-limit, and skip forced rotations and quirky rules.
-
Build for tenants: domain routing, employee-ID options where needed, and white-label login screen design (logo, colors, custom domain) that never breaks contrast.
-
2026 baseline: passwordless and accessible by default.
What is a login page?
A focused screen for returning, authenticated access to sensitive, tenant-scoped data.
It’s where you prove the product is stable and ready for work. In B2B, people arrive with a job to do and very little patience. Your design should feel obvious on first glance: the right logo, the right controls, the shortest path in.
⚠️ Terminology note
|
Login page best practices 2026 (with B2B login page examples)
1. Start with the path that enterprises expect
-
Primary CTA: “Sign in with your organization” (SSO).
-
Peer option: “Use a passkey”.
-
Fallbacks: Password or email OTP. Keep “Create account” on a secondary path.
This order signals trust (policy lives with the IdP) and cuts a lot of reset tickets. Passkeys are phishing‑resistant and feel seamless on modern devices.
2. Ask for identity first, then route by domain
Begin with the email/UPN field. As soon as it’s valid, route automatically:
-
Known domain → send to the organization’s IdP (SAML/OIDC).
-
Unknown domain → stay on native auth and show the methods this tenant allows.
This pattern removes decision fatigue and supports multi‑tenant routing without extra UI.
Some tenants authenticate with employee IDs or customer numbers. Let users switch the identifier, show clear helper text (e.g., “8-10 digits; no dashes”), set a numeric keypad on mobile, and still accept email/UPN as an alternate.
3. Choose one column and make it breathe
A single column wins for scan speed and mobile parity. Labels sit above inputs; helper text lives under what it explains; the primary action feels inevitable.
Add a second column only when it truly helps: co‑branding that reduces doubt or a required policy/security banner. If the rail doesn’t help someone sign in faster or safer, drop it.
4. Make feedback immediate and human
Validate on blur and on submit, never mid‑typing. Keep messages short and specific, then tell people what to do next. For example:
-
“Check your email format.”
-
“Caps Lock is on.”
-
“We couldn’t verify that code. Try again or request a new one.”
Keep focus in the form and announce errors for assistive tech.
5. Use actionable, enterprise-specific errors
Treat errors as instructions, especially for enterprise edge cases:
-
Invalid credentials → “Your email or password is incorrect. Try again or reset it.”
-
Account locked → “Too many attempts. Your account is temporarily locked. Contact your administrator.”
-
SSO unavailable → “Single Sign‑On can’t be reached. Try another method or check status.”
Also: don’t leak whether an account exists; throttle attempts; include a small status link near the button.
6. Integrate brand identity in white-label / multi-tenant platforms
Most B2B products are multi‑tenant. Keep branding flexible but safe:
-
Theme with tokens (logo, palette, type, dark/light);
-
Support custom subdomains and keep co‑branding balanced and legible;
-
Derive tenant from email domains when possible; otherwise, provide a clean tenant picker.
Theming must never break contrast or error visibility.
7. Ship security that helps, not security theater
Follow NIST/OWASP so security supports the flow:
-
Don’t force periodic password changes;
-
Don’t require bizarre composition rules;
-
Allow long passphrases;
-
Block known‑breached passwords;
-
Step up to phishing‑resistant methods on risk (passkeys, security keys).
8. Design for accessibility
Everything works with a keyboard (Tab/Shift+Tab), with visible focus. Labels are persistent (placeholders are not labels), and errors link to the fields that need attention.
Target size should meet WCAG 2.2 2.5.8 Target Size (Minimum): 24×24 CSS px or equivalent spacing.
9. Use security banners when compliance requires it
If your customers need a system-use warning, place it above the form with a short, scannable message and a link to the full policy. Support “I agree” capture if mandated.
Password & passwordless: quick guide
Method | Security | Friction | IT overhead | Enterprise fit |
---|---|---|---|---|
Passwords | Low (phishing-prone) | High | High (resets) | Low |
MFA (SMS/App) | Medium | Medium | Medium | Medium |
Magic link / OTP | Medium | Low | Low | Medium |
Passkeys phishing-resistant | High (phishing-resistant) | Low | Very low | High |
SSO (SAML/OIDC) phishing-resistant | High (phishing-resistant) | Low | Very low | Required |
Login page design mistakes to avoid
-
Mixing login and registration on one card without a clear separation (users log into the sign-up form);
-
Over-branding the screen so much that the form gets buried (remember the job to be done);
-
CAPTCHAs by default: only add when risk signals justify it; otherwise, you’re just punishing humans.
-
Leaky errors: “Email not found” invites enumeration. Say “Check your credentials,” and throttle.
-
Forced password rotations and mandatory “special character” rules: they push users to weak, formulaic passwords and sticky notes.
-
Ignoring help-desk reality: password resets are a top ticket category. Design to reduce them (SSO, passkeys, self-service).
Microcopy kit (steal this)
💡 Questions designers should ask
-
What’s the fastest happy path for a returning enterprise user?
-
Which authentication can we push to SSO or passkeys today?
-
Do any tenants require employee ID or domain-specific logins?
-
What tenant branding elements must be configurable?
-
Which errors need special admin guidance?
-
Are we aligned with NIST SP 800-63 and WCAG 2.2?
🤝 Credits
This guide reflects Cieden’s product design practice and current security & a11y standards. Key references:
- NIST SP 800-63B-4 (2025)
- FIDO Alliance: Passkey / WebAuthn UX Guidelines
- W3C WebAuthn
- OWASP guidance
- WCAG 2.2
- Microsoft Entra: Add company branding to the sign-in page
📚 Keep exploring
- Nielsen Norman Group: Forms & error-message UX
- Apple Human Interface Guidelines: Controls, text fields, sign-in patterns
- Material Design (M3): Text fields, validation, dialogs
- USWDS: Form controls & validation patterns
- Atlassian Design System: Forms & validation
- WCAG 2.2: Target Size (Minimum) & Error Identification