Build resilience in your identity and access management infrastructure
Azure Active Directory is a global cloud identity and access management system that provides critical services such as authentication and authorization to your organization’s resources. This document provides you with guidance to understand, contain, and mitigate the risk of disruption of authentication or authorization services for resources that rely on Azure Active Directory (Azure AD).
The document set is designed for
Identity Architects
Identity Service Owners
Identity Operations teams
Please also see the documentation for application developers and for Azure AD B2C systems.
What is resilience?
In the context of your identity infrastructure, resilience is the ability to endure disruption to services like authentication and authorization, or failure of other components, with minimal or no impact to your business, users, and operations. The impact of disruption can be severe, and resilience requires diligent planning.
Why worry about disruption?
Every call to the authentication system is subject to disruption if any component of the call fails. When authentication gets disrupted, because of the underlying component failures, your users will not access their applications. Therefore, reducing the number of authentication calls and number of dependencies in those calls is important to your resilience. Application developers can assert some control over how often tokens are requested. For example, work with your developers to ensure they're using Azure AD Managed Identities for their applications wherever possible.
In a token-based authentication system like Azure AD, a user’s application (client) must acquire a security token from the identity system before it can access an application or other resource. During the validity period, a client can present the same token multiple times to access the application.
When the token presented to the application expires, the application rejects the token, and the client must acquire a new token from Azure AD. Acquiring a new token potentially requires user interaction such as credential prompts or meeting other requirements of the authentication system. Reducing the frequency of authentication calls with longer-lived tokens decreases unnecessary interactions. However, you must balance token life with the risk created by fewer policy evaluations. For more information on managing token lifetimes, see this article on optimizing reauthentication prompts.
Ways to increase resilience
The following diagram shows six concrete ways you can increase resilience. Each method is explained in detail in the articles linked in the Next steps portion of this article.

Next steps
Resilience resources for administrators and architects
Build resilience by using Continuous Access Evaluation (CAE)
Build resilience in application access with Application Proxy
Resilience resources for developers
Povratne informacije
Pošalјite i prikažite povratne informacije za