There’s a quiet crisis happening at checkout, and most merchants are optimizing for the wrong problem.
You’ve probably heard the 3D Secure 2.0 pitch: frictionless authentication, risk-based decisioning, 70% reduction in cart abandonment compared to the old clunky 3DS1 redirects. European merchants got forced into it by PSD2’s Strong Customer Authentication mandate in 2021. US merchants mostly avoided it, figuring why add authentication friction when you’re not legally required to?
But here’s what nobody’s connecting: 3DS2 performance and checkout page performance aren’t separate problems. They’re the same problem, manifesting at different points in the payment flow. And when you fix them together—not sequentially, but simultaneously—you get something the industry isn’t talking about yet: checkout experiences where security is invisible to legitimate customers, fraud gets blocked without collateral damage, and conversion rates actually improve.
The data backs this up in ways that contradict conventional wisdom. When Japan mandated 3DS2 in April 2025, the payment industry braced for conversion carnage. Instead, Stripe’s analysis showed 60% of transactions routing through frictionless flows, a 93% overall conversion rate, and dispute rates dropping 30% year-over-year. France challenges cardholders at twice the rate of other European markets—more authentication friction, in theory—yet maintains high conversion because their issuers and merchants actually optimized the experience. Meanwhile, poorly implemented 3DS2 costs European merchants 2-3.5% conversion and US merchants up to 15% when they do use it.
So what’s the difference between implementations that kill conversion and those that preserve or improve it? It’s not just about maximizing frictionless flow. It’s about treating authentication as part of a larger interaction design problem that includes how fast your checkout form responds to user input in the first place.
3DS2 Checkout Optimization: The Performance Problem Hiding Inside the Authentication Problem
Let’s talk about Interaction to Next Paint, or INP. If you’re not deep in Core Web Vitals, here’s what matters: in March 2024, Google made INP an official ranking signal, replacing First Input Delay. INP measures how long it takes between when a user clicks, taps, or types something and when they see a visual response. Google’s threshold is simple—200 milliseconds or less is good, 200-500ms needs improvement, anything over 500ms is poor.
Why does this matter for checkout? Because 90% of a user’s time on a page happens after the initial load. That means responsiveness to interactions—clicking “Place Order,” entering a CVV, selecting a shipping option—matters more than how fast the page first appears. And checkout forms are interaction-heavy by design. Every form field, every button click, every dropdown selection is a potential INP measurement.
Now layer 3DS2 authentication on top of that. Even in a frictionless flow where the customer never sees a challenge screen, you’re adding JavaScript execution for risk calculation, network requests to the Access Control Server, iframe injection in case a challenge is needed, and device fingerprinting through the 3DS Method URL. Optimizing the authentication flow—whether frictionless or challenge—is critical for maintaining fast performance and a seamless checkout experience. In a challenge flow, you’re adding all of that plus the time to load the issuer’s authentication interface, render the biometric prompt or OTP field, and process the response.
Baymard Institute’s 2025 checkout benchmark reveals that 64% of desktop sites and 63% of mobile sites already have “mediocre or worse” checkout UX before adding any authentication. When you take a slow, unresponsive checkout form—one where clicking into a field takes 400ms to show focus state, or where validation errors take 600ms to appear after you fix a typo—and you add slow 3DS2 implementation on top of it, you’ve created what users experience as a completely broken payment flow. Poor implementation of 3DS2 can significantly harm the consumer experience, making it even more likely that users will abandon the process.
The abandonment isn’t happening because of authentication per se. It’s happening because the entire interaction feels sluggish and unresponsive, and authentication just becomes the final straw that makes users give up.
Where the friction actually happens in strong customer authentication
Let’s look at three specific moments where poor INP and poor 3DS2 implementation combine to kill conversions, because understanding the exact failure modes in the payment process makes the solution obvious. Friction at these points is a critical failure that directly impacts conversion rates.
The laggy form field. A user is filling out their billing address. They click into the “ZIP code” field. Nothing happens for 350 milliseconds—the field doesn’t show focus state, the cursor doesn’t appear, there’s no visual confirmation their click registered. They click again. Now the field has focus, but their second click selected all the text that got partially entered from a previous attempt, and they have to start over. This happens because the checkout page is running expensive JavaScript validation on every keystroke in the previous field, blocking the main thread and preventing the browser from responding to the next interaction.
By the time this user gets to the payment submission step, they’re already frustrated. If 3DS2 then requires a challenge because your implementation didn’t send enough data for the issuer to approve frictionless, and that challenge screen takes 3 seconds to load because you’re using a browser iframe instead of a native mobile SDK, the user is gone. They didn’t abandon because of authentication—they abandoned because nothing in your checkout felt responsive.
The uncertain submission. User clicks “Place Order.” Nothing happens. The button doesn’t change state, no spinner appears, there’s no “Processing…” text. After 2 seconds of staring at an unchanged screen, they assume their click didn’t register and click again. Now you have a double-submission problem that creates errors, or the 3DS2 frictionless flow was actually working but the lack of visual feedback made them think it wasn’t.
This is an INP failure and a 3DS2 implementation failure happening simultaneously. The button should provide visual feedback within 100 milliseconds—disabled state, text change, spinner. That’s basic interaction design. But it’s especially critical when 3DS2 is running in the background, because even frictionless flows take 1-2 seconds when device fingerprinting data hasn’t been pre-loaded. Without immediate visual feedback, that 1-2 second gap feels like an eternity, and users assume something broke.
The mobile authentication trap. Over half of all ecommerce transactions happen on mobile devices. Yet most merchants implement 3DS2 using browser-based iframes instead of native mobile SDKs. When a challenge is required, the iframe loads slowly (3-5 seconds on average), doesn’t fit the mobile viewport properly, requires pinch-and-zoom to see the OTP entry field, and often times out before the user can complete authentication. Even when it works, the experience of suddenly seeing your bank’s authentication interface injected into the merchant’s checkout page—in a tiny iframe that looks nothing like your bank’s app—creates confusion and distrust.
Native iOS and Android 3DS2 SDKs solve this by enabling in-app biometric authentication. Face ID, Touch ID, fingerprint—all without leaving the merchant app or loading an iframe. The authentication feels native because it is native. Challenge completion rates are dramatically higher, authentication time is faster, and the entire flow feels more responsive because you’ve eliminated the iframe rendering bottleneck. Unlike older approaches such as static passwords—where users had to remember and enter a fixed password, often leading to friction and cart abandonment—modern authentication methods are designed to be seamless and user-friendly.
These three failure modes share a common thread: slow interactions and unclear feedback create perceived brokenness that authentication challenges can’t overcome. The inverse is also true—fast, responsive interactions with clear feedback make authentication challenges feel like natural parts of the checkout flow rather than disruptive obstacles.
The frictionless flow misconception in customer experience
Here’s where merchants get 3DS2 strategy wrong. The industry frames “frictionless flow” as the goal—get as many transactions as possible approved without challenging the cardholder. And yes, frictionless is better than unnecessary challenges. But frictionless doesn’t mean instantaneous or invisible if your implementation is slow.
Stripe’s analysis shows frictionless authentication rates increased 40% in the first half of 2024. That sounds great until you realize the metric everyone tracks is “frictionless rate” but nobody tracks “frictionless completion time.” A transaction can technically route through the frictionless pathway but still take 4 seconds to complete because the merchant didn’t invoke the 3DS Method URL early enough, didn’t send complete device fingerprinting data, or has network latency issues communicating with the Access Control Server. Optimizing frictionless rate and completion time directly impacts acceptance rates and authorization rates, as faster and more reliable flows lead to higher transaction approvals and fewer declines.
From a conversion standpoint, a 4-second frictionless flow isn’t much better than a 5-second challenge flow. Both feel slow. Both create the perception of a broken checkout. Both trigger the user behavior of clicking the submit button multiple times or abandoning entirely.
This is why Japan’s 93% conversion rate after their 3DS2 mandate is so instructive. They didn’t just maximize frictionless rates—they optimized the implementation quality of both frictionless and challenge flows. Device data pre-loaded through early Method URL invocation. Rich transaction context shared so issuers could make accurate risk decisions. Native mobile authentication experiences that felt seamless. The result wasn’t just more frictionless flows—it was faster frictionless flows and more successful challenge flows. A well-designed authentication strategy was key to achieving both high conversion and regulatory compliance in this market.
Understanding 3D Secure
3D Secure (3DS) is a foundational security protocol in the world of online payments, designed to add an extra layer of protection for both merchants and customers. At its core, 3DS enables strong customer authentication by verifying that the person making a transaction is the legitimate cardholder, dramatically reducing the risk of fraudulent transactions. This protocol, sometimes called Payer Authentication, is now a critical part of the payments industry, especially as regulatory changes like the Payment Services Directive (PSD2) and Strong Customer Authentication (SCA) regulations reshape the landscape across the European Economic Area.
The 3DS authentication process is built around risk-based authentication. When a customer initiates a payment, the merchant’s payment service provider communicates with the card issuer to assess the transaction’s risk. If the transaction appears low-risk—say, a returning customer using a familiar device—the issuer may approve it instantly, resulting in a frictionless flow where the customer barely notices any extra step. For higher-risk transactions, the issuer can trigger a challenge flow, asking the customer for additional authentication, such as a one-time password (OTP), biometric verification, or out-of-band authentication via a mobile banking app. This dynamic approach enables merchants to provide a seamless customer experience for most transactions, while still enhancing security when it matters most.
One of the most significant advantages of 3DS is the liability shift it creates. When merchants use 3DS, the responsibility for fraud-related chargebacks moves from the merchant to the card issuer. This not only protects merchants from the financial impact of fraudulent transactions but also encourages broader adoption of secure authentication methods. By leveraging 3DS, merchants can reduce fraud, improve approval rates, and build customer loyalty through a more secure and trustworthy payment experience.
3DS supports a wide range of authentication methods, including two-factor authentication, biometrics like facial recognition or fingerprint scanning, and out-of-band authentication that leverages mobile devices. These methods provide an extra layer of security, making it much harder for fraudsters to gain unauthorized access. Additionally, 3DS enables merchants to send more data elements—such as browser IP address, device information, and transaction context—to the card issuer. This richer data set allows for more informed risk assessments and smarter transaction approval, which can directly improve conversion rates and reduce false positives.
For merchants, the benefits go beyond just security. A well-implemented 3DS solution can actually reduce cart abandonment by making the authentication process as seamless and non-intrusive as possible. When customers trust that their transactions are secure and experience minimal friction at checkout, they’re more likely to complete their purchases—driving higher conversion rates and more revenue. At the same time, 3DS helps merchants stay compliant with evolving SCA regulations and adapt to new fraud patterns, ensuring they’re prepared for the future of digital commerce.
In summary, 3D Secure is more than just a compliance checkbox—it’s a strategic tool that enables merchants to enhance security, reduce fraud, and deliver a seamless customer experience. By understanding the mechanics of 3DS and implementing it thoughtfully, merchants can provide customers with secure transactions, protect themselves from fraud-related chargebacks, and position their businesses for success in the rapidly evolving payments industry.
What actually works: The four optimization patterns
The solution isn’t “do 3DS2 or don’t do 3DS2” and it’s not “make checkout forms faster or add more security.” It’s recognizing that authentication and interaction performance are interdependent, and optimizing them together unlocks conversion gains you can’t achieve by working on either problem in isolation.
First, maximize frictionless approval through data richness, not volume reduction. The instinct when facing high challenge rates is to send fewer transactions through 3DS2. Request exemptions for everything possible, avoid authentication on lower-value orders, only authenticate when strictly required by regulation. This reduces authentication volume but does nothing to improve the experience for transactions that do require authentication.
The better approach is making the issuer’s risk decisioning so accurate that they can approve frictionless when it’s safe and only challenge when truly necessary. EMV 3DS 2.2 supports over 150 data elements per transaction. Most merchants send maybe 20-30. The delta matters enormously. 3DS2 is supported by major card schemes and card networks, which have established industry-wide protocols to enhance payment security. The issuing bank plays a key role in authentication, confirming the cardholder’s legitimacy and ensuring successful transaction processing.
Device fingerprint collected through the 3DS Method URL gives issuers signals about whether this device has been seen before, whether it matches known patterns for this customer, whether there are suspicious characteristics. Customer account attributes—account age, number of previous purchases, date of last password change—help issuers distinguish between legitimate returning customers and account takeover attempts. Transaction context like delivery timeframe, shipping method, and whether this is a reorder provides behavioral signals that pure transaction value can’t capture. Payment providers and payment service providers facilitate secure card payments and support 3DS2 implementation, ensuring compliance and a seamless authentication process.
When you send this complete data set, issuers can make confident frictionless approvals for low-risk transactions that would otherwise get challenged. The 3DS Requestor Challenge Indicator becomes a strategic tool here—setting it to “02” (no challenge preferred) for returning customers shipping to known addresses, or “03” (challenge requested) for first-time high-value orders from new devices. You’re telling the issuer “here’s our risk assessment, here’s the complete context, here’s our recommendation,” which makes their decisioning faster and more accurate.
Second, optimize form-level interactions for sub-200ms INP before worrying about authentication latency. This is where the narrative around checkout optimization misses the forest for the trees. Merchants obsess over reducing payment steps from four to three, or enabling one-click checkout, while ignoring that their form fields take 400 milliseconds to respond to user input.
Baymard found that 97% of sites use plain text fields for quantity updates in the cart. Text fields require clicking into the field, selecting existing text, typing a new number, and triggering validation. Compare that to buttons with +/- controls: single click, immediate visual feedback, no keyboard required. The difference in INP is dramatic—text fields routinely measure 300-500ms interaction latency while button-based selectors measure 80-150ms.
Scale that pattern across the entire checkout form. Browser-native form controls with autocomplete attributes are pre-optimized by browsers. Custom JavaScript form wrappers that add real-time validation, masked input formatting, or custom styling add processing overhead that degrades INP. When you must use custom controls—card number masking is a legitimate UX improvement—debounce the validation. Validate when the user leaves the field or after a 500ms pause in typing, not on every single keystroke.
Adaptive error messages are another INP optimization disguised as a UX improvement. Generic “Invalid card number” forces users to guess what’s wrong, leading to multiple attempted corrections and multiple validation cycles. Each validation attempt is another interaction that gets measured for INP. Specific “Card number incomplete—needs 16 digits” gets users to resolution on the first attempt, reducing the total number of interactions needed and improving overall INP scores.
The performance budget here is straightforward: 75th percentile of form interactions should complete in under 200ms. That’s Google’s “good” threshold, and it’s achievable with streamlined JavaScript, browser-native controls where possible, and debounced validation.
Third, eliminate mobile-specific performance penalties through native SDKs. The browser-based 3DS2 implementation that works acceptably on desktop completely falls apart on mobile. Iframes render slowly on constrained mobile devices. They don’t adapt to small viewports without careful responsive design. The visual disconnect of suddenly seeing your bank’s interface injected into the merchant’s checkout creates confusion. And you lose access to device-native biometric authentication—Face ID and Touch ID require native app context, not browser iframes.
Native iOS and Android 3DS2 SDKs solve all of these problems simultaneously. In-app biometric authentication without leaving the merchant app. Richer device data collection that improves frictionless approval rates. Faster challenge presentation through native UI instead of iframe rendering. Push-based authentication where the challenge gets sent to the user’s banking app and they approve it there, again without disrupting the merchant checkout flow.
The conversion impact is measurable. Poorly implemented mobile 3DS2 sees 10-15% lower conversion than desktop. Well-implemented native mobile 3DS2 brings mobile conversion within 5% of desktop. That’s not a small difference when more than half your transactions are mobile. Poor implementation can lead to lost revenue due to unnecessary declines, while better optimization enables more payments to be approved and increases transaction success rates.
Fourth, provide immediate visual feedback during submission and authentication. This is about perceived performance, which matters as much as actual performance for conversion. When a user clicks “Place Order,” they need confirmation within 100 milliseconds that something is happening. Disable the button, change the text to “Processing…,” show a spinner. This is basic interaction design but it’s critical when authentication adds latency.
Even a frictionless 3DS2 flow takes 1-2 seconds from submission to completion. Without immediate visual feedback, users perceive that as a frozen page. With immediate feedback—button state change in < 100ms, progress indicator showing “Verifying payment…”—the same 1-2 second authentication time feels responsive and intentional.
The 3DS Method URL invocation is key to reducing frictionless flow latency. Most implementations invoke it at payment submission. Better implementations invoke it when the user selects their payment method, before they’ve filled out the rest of the form. This pre-loads device fingerprinting data into the issuer’s Access Control Server. When the actual authentication request happens, the issuer already has the device data, cutting frictionless approval time from 3-5 seconds to under 1 second. Fraud prevention is a vital component here, and optimizing for your risk appetite helps balance security and sales growth. Identifying different transaction types, such as those eligible for exemptions or out-of-scope, is also crucial to optimize the payment process and comply with 3DS2 requirements.
Ultimately, the goal of 3ds2 checkout optimization is to achieve both security and user experience, ensuring safe, seamless, and high-conversion online transactions.
What this looks like in practice
Let me make this concrete with a timeline of what the user experiences in a well-optimized implementation versus a poorly optimized one. Each step in the process directly impacts the speed, security, and success of payment transactions.
Poorly optimized: User fills out checkout form. Clicking into form fields shows focus state after 350ms (slow INP due to heavy JavaScript on the page). They correct a typo in their email address and the validation error takes 500ms to clear (synchronous API validation on every keystroke). They click “Place Order” and nothing happens for 3 seconds (no visual feedback, 3DS Method URL not pre-invoked so device fingerprinting happens at submission). Transaction gets flagged for challenge because merchant only sent 25 of 150 possible data fields to the issuer. Challenge screen loads in an iframe that takes 5 seconds to render on mobile and doesn’t fit the viewport. User gives up. Total time from first form interaction to abandonment: 45 seconds.
Well-optimized: User fills out checkout form. Form fields respond in under 150ms (browser-native controls, debounced validation). Email validation error appears immediately when they blur the field (client-side validation, adaptive error message). They click “Place Order” and button state changes to “Processing…” within 100ms (immediate visual feedback). Frictionless 3DS2 approval completes in 1.2 seconds because device fingerprinting data was pre-loaded when they selected their payment method. At this stage, offering a broader range of payment options, including open banking solutions, can further enhance user convenience and flexibility. Order confirmation appears. Total time from first form interaction to completion: 22 seconds. No abandonment.
Or in the challenge scenario: Same fast form interactions. Same immediate visual feedback on submission. Transaction flagged for challenge because it’s a first-time customer with high order value. Challenge screen appears in native iOS Face ID prompt (mobile SDK implementation). The customer’s bank is responsible for verifying the transaction, often prompting the user for a code, password, or biometric authentication, which shifts fraud liability from the merchant to the bank. User authenticates with their face, challenge completes in 4 seconds. Order confirmation appears. Total time: 28 seconds. Still faster than the poorly optimized frictionless flow.
This is the non-obvious insight: a well-implemented challenge flow can have better conversion than a poorly implemented frictionless flow, because perceived responsiveness matters more than whether authentication happened visibly or invisibly.
The measurement framework for payment service providers that makes this actionable
You can’t optimize what you don’t measure, and most merchants are measuring the wrong things. They track frictionless rate, challenge success rate, and overall conversion. Those are outcomes, not diagnostics. When measuring, focus on payment transactions as the key area these metrics are meant to improve.
The diagnostic metrics that actually tell you where to optimize:
Track INP separately for each checkout stage—shipping information, payment details, review/submit. Identify which interactions contribute to the worst INP scores. Is it form field entries? Button clicks? Dropdown selections? This tells you which interactions to optimize first.
Measure frictionless completion time, not just frictionless rate. A 60% frictionless rate with 3-second average completion time is worse than a 50% frictionless rate with 1-second completion time. Fast challenges beat slow frictionless flows.
Correlate INP performance buckets with conversion rate. Compare conversion for users experiencing < 200ms INP versus 200-500ms versus >500ms. This quantifies the revenue impact of INP optimization. When you can say “moving 20% of users from ‘needs improvement’ to ‘good’ would generate $24,000/month in additional revenue,” you have executive buy-in for the work.
Track authorization rates and acceptance rates alongside other metrics to identify optimization opportunities in your payment approval and transaction processes.
Track mobile-specific metrics separately. Mobile conversion rate compared to desktop. Challenge completion rate by authentication method (biometric vs OTP vs push). Average authentication time on mobile versus desktop. These reveal whether your mobile implementation is killing conversion in ways that desktop metrics hide.
The performance budget approach works here. Set INP budget: < 200ms for 75th percentile, < 300ms for 95th percentile. Set 3DS budgets: >60% frictionless for returning customers, >50% for all traffic, < 5% challenge abandonment. Monitor both in production. When either metric degrades, you know exactly where to investigate.
Why this matters now
The checkout optimization conversation has been stuck in a false dichotomy for years: security or conversion, fraud protection or user experience, authentication or abandonment. The data from regulated markets that forced 3DS2 adoption proves the dichotomy is false. Japan, France, and broader European markets show that you can have both—but only if you treat authentication and interaction performance as connected problems rather than competing priorities.
US merchants avoiding 3DS2 because “it kills conversion” are accepting 100% fraud liability to preserve conversion rates that could actually improve with optimized 3DS2+INP implementation. Merchants accepting poor 3DS2 implementations are losing 2-15% conversion unnecessarily when the fix is richer data sharing and faster form interactions.
Baymard’s benchmark showing 64% of checkouts have mediocre-or-worse UX means most merchants have low-hanging fruit in basic form optimization before even considering authentication. When you combine those foundational improvements with intelligent 3DS2 that maximizes frictionless flow through data richness and minimizes challenge friction through native mobile experiences, you don’t just preserve conversion—you improve it while reducing fraud.
That’s not a trade-off. That’s checkout optimization where security becomes invisible to legitimate customers and friction only appears when it’s actually protecting against fraud. The merchants who figure this out first are going to have a measurable advantage over competitors still debating whether to enable 3DS2 at all.


