Email + Password + PIN (Profile Verified)
Need a hand? Setting up developer credentials can sometimes feel a bit overwhelming. We offer a complimentary 15-minute onboarding session to help you get this configured perfectly. Book your session with a specialist here
When you are building your Bread & Butter widgets, you have several options for how you want to capture visitor data. The Email + Password + PIN (Profile Verified) option is the traditional, high-security account creation route.
While 1-click social connections (like Google or Microsoft) automatically verify a user's identity, this option provides the exact same level of ironclad verification for users who simply prefer to create a traditional email and password credential.
Here is an overview of how the Profile Verified capture option works and the best strategic times to use it.
What Data It Captures
This option is designed to create a complete, traditional user account. When a visitor uses this method, the system will automatically prompt them for and capture:
- Their Email Address
- A newly generated Password
- Their First Name
- Their Last Name
Built-In Verification & Security
This ensures you have an absolute guarantee that the visitor owns the email address they provided.
Unlike a basic email capture field where a user could potentially type in an email address that belongs to someone else, this method requires active proof of ownership.
Once the user enters their information and creates a password, Bread & Butter immediately sends a unique, secure PIN directly to their inbox. The user must retrieve this PIN and enter it into the widget to complete the sign-up process. This creates a fully verified profile and guarantees that the visitor has active, real-time access to the mailbox they provided.
When to Use It
This dictates the best strategic placement for this conversion option.
We highly recommend prioritizing the Email + Password + PIN option when you need a fully verified profile and cannot risk capturing unverified data. Because this is a higher-friction, high-commitment step for users, it is perfect for scenarios that grant access to significant value or sensitive information.
Best use cases include:
- Unlocking high-value, proprietary gated content (like an exclusive course or data report)
- Any scenario where you need social-login-level verification, but want to offer a traditional credential alternative