Skip to content

Commit 3ab8acf

Browse files
Merge pull request #185316 from MarkusVi/mon59
mon59
2 parents 6c918b3 + b55089f commit 3ab8acf

File tree

2 files changed

+94
-0
lines changed

2 files changed

+94
-0
lines changed
Lines changed: 92 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,92 @@
1+
---
2+
title: Azure Active Directory SLA performance | Microsoft Docs
3+
description: Learn about the Azure AD SLA performance
4+
services: active-directory
5+
documentationcenter: ''
6+
author: MarkusVi
7+
manager: karenhoran
8+
editor: ''
9+
10+
ms.assetid: 9b88958d-94a2-4f4b-a18c-616f0617a24e
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.tgt_pltfrm: na
14+
ms.workload: identity
15+
ms.subservice: report-monitor
16+
ms.date: 03/15/2022
17+
ms.author: markvi
18+
ms.reviewer: besiler
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Azure Active Directory SLA performance
24+
25+
As an identity admin, you may need to track Azure AD's service-level agreement (SLA) performance to make sure Azure AD can support your vital apps. This article shows how the Azure AD service has performed according to the [SLA for Azure Active Directory (Azure AD)](https://azure.microsoft.com/support/legal/sla/active-directory/v1_1/).
26+
27+
You can use this article in discussions with app or business owners to help them understand the performance they can expect from Azure AD.
28+
29+
30+
## Service availability commitment
31+
32+
Microsoft offers Premium Azure AD customers the opportunity to get a service credit if Azure AD fails to meet the documented SLA. When you request a service credit, Microsoft evaluates the SLA for your specific tenant; however, this global SLA can give you an indication of the general health of Azure AD over time.
33+
34+
The SLA covers the following scenarios that are vital to businesses:
35+
36+
- **User authentication:** Users are able to login to the Azure Active Directory service.
37+
38+
- **App access:** Azure Active Directory successfully emits the authentication and authorization tokens required for users to log into applications connected to the service.
39+
40+
For full details on SLA coverage and instructions on requesting a service credit, see the [SLA for Azure Active Directory (Azure AD)](https://azure.microsoft.com/support/legal/sla/active-directory/v1_1/).
41+
42+
43+
## No planned downtime
44+
45+
You rely on Azure AD to provide identity and access management for your vital systems. To ensure Azure AD is available when business operations require it, Microsoft does not plan downtime for Azure AD system maintenance. Instead, maintenance is performed as the service runs, without customer impact.
46+
47+
## Recent worldwide SLA performance
48+
49+
To help you plan for moving workloads to Azure AD, we publish past SLA performance. These numbers show the level at which Azure AD met the requirements in the [SLA for Azure Active Directory (Azure AD)](https://azure.microsoft.com/support/legal/sla/active-directory/v1_1/), for all tenants.
50+
51+
For each month, we truncate the SLA attainment at three places after the decimal. Numbers are not rounded up, so actual SLA attainment is higher than indicated.
52+
53+
54+
| Month | 2021 | 2022 |
55+
| --- | --- | --- |
56+
| January | | 99.999% |
57+
| February | 99.999% | 99.999% |
58+
| March | 99.568% | |
59+
| April | 99.999% | |
60+
| May | 99.999% | |
61+
| June | 99.999% | |
62+
| July | 99.999% | |
63+
| August | 99.999% | |
64+
| September | 99.999% | |
65+
| October | 99.999% | |
66+
| November | 99.998% | |
67+
| December | 99.978% | |
68+
69+
70+
71+
### How is Azure AD SLA measured?
72+
73+
The Azure AD SLA is measured in a way that reflects customer authentication experience, rather than simply reporting on whether the system is available to outside connections. This means that the calculation is based on whether:
74+
75+
- Users can authenticate
76+
- Azure AD successfully issues tokens for target apps after authentication
77+
78+
The numbers above are a global total of Azure AD authentications across all customers and geographies.
79+
80+
81+
## Incident history
82+
83+
All incidents that seriously impact Azure AD performance are documented in the [Azure status history](https://status.azure.com/status/history/). Not all events documented in Azure status history are serious enough to cause Azure AD to go below its SLA. You can view information about the impact of incidents, as well as a root cause analysis of what caused the incident and what steps Microsoft took to prevent future incidents.
84+
85+
86+
87+
88+
## Next steps
89+
90+
* [Azure AD reports overview](overview-reports.md)
91+
* [Programmatic access to Azure AD reports](concept-reporting-api.md)
92+
* [Azure Active Directory risk detections](../identity-protection/overview-identity-protection.md)

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,8 @@
104104
- name: Reference
105105
expanded: true
106106
items:
107+
- name: Azure Active Directory SLA performance
108+
href: reference-azure-ad-sla-performance.md
107109
- name: Basic info in the sign-in logs
108110
href: reference-basic-info-sign-in-logs.md
109111
- name: Azure AD PowerShell cmdlets for reporting

0 commit comments

Comments
 (0)