How to Balance User Productivity with Solid Authentication Protocols