Skip to content
Payments Economics 15 min read

Payment Routing KPIs: Auth Rate, Failover, Cost, and Recovery

Operator scorecard for payment routing teams: 15 KPIs across approval performance, routing reliability, cost efficiency, latency, and recovery.

PB
By Shaun Toh
TL;DR

Most routing teams track a blended auth rate and a blended cost. Both hide per-route signals. A routing scorecard covers five categories: approval performance, routing reliability, cost efficiency, latency, and recovery — segmented by acquirer and BIN range.

Most routing teams report a blended authorisation rate to leadership. That number — one percentage across all acquirers, currencies, and transaction types — is the metric that receives the most attention and tells you the least about where to act.

A routing operation’s auth rate is not one number. It is a weighted average of several per-acquirer approval rates, each reflecting a different BIN distribution, issuer relationship, and traffic segment. A blended 92% can conceal a primary acquirer running at 94% and a fallback route running at 86% — with a failover policy deciding which transactions land on the weaker path. The same aggregation problem applies to cost: a blended effective rate obscures per-route MDR differences, scheme fee exposure from avoidable cross-border routing, and the interchange yield available if Level 2/3 data is applied consistently.

The operational scorecard for a routing function covers five categories: approval performance, routing reliability, cost efficiency, latency, and recovery. This is the measurement layer for teams who have read what a routing improvement is worth in revenue terms and which levers move the approval rate — the scoreboard for tracking whether those levers are in place and working.

The Short Answer

Five categories. A complete payment routing operations scorecard covers:

  • Approval performance — authorisation rate by acquirer, network-decline reason code distribution, soft-decline recovery rate
  • Routing reliability — primary acquirer success rate, failover invocation rate, failover success rate, routing rule exception rate
  • Cost efficiency — effective rate per route, interchange optimisation yield, cross-border routing share
  • Latency — authorisation latency P50/P95 by acquirer, retry-overhead latency
  • Recovery — retry win rate by decline code, network token coverage, 3DS step-up conversion rate

Operator-set targets. Scheme monitoring thresholds (VAMP, Mastercard ECP) cover chargeback and fraud ratios — not routing performance or cost efficiency. Vendor-published auth rate uplift figures from PSPs reflect results on their own traffic base and should not be used as routing targets. Most routing KPI targets are judgment calls based on your traffic mix, acquirer contract structure, and volume profile.

The KPI Scorecard

MetricCalculationBenchmark / sourceTarget guidanceCadenceEscalation trigger
Approval Performance
Authorisation rate by acquirerApproved tx ÷ attempted tx, per acquirer and traffic segmentOperator-set; no published per-acquirer standardTrack delta vs established baseline per acquirer — set internal floorDaily>2 pp drop week-over-week on any single acquirer
Network-decline reason code distribution% of declined tx by ISO-8583 response code, by issuer region and BINOperator-set; track shifts in distribution, not absolute levelsStable distribution vs 4-week baselineWeeklySpike >20% WoW in any single code category
Soft-decline recovery rateApproved on eligible retry ÷ total soft-declined txOperator-set; no universal benchmark — varies by retry logic, code mix, and verticalTrack delta vs internal baseline; segment by decline codeWeeklySustained drop >5 pp below rolling 30-day baseline
Routing Reliability
Primary acquirer success rateTx successfully routed to primary acquirer ÷ tx attempted on primary pathOperator-set; reflects contracted primary route performanceStable vs baseline; any sustained degradation indicates acquirer instabilityDailySustained dip on any primary route
Failover invocation rateTx that triggered failover logic ÷ total tx attemptsOperator-set; should remain stable and low for normal operationsSet high and low alert thresholds around 30-day baselineDaily>50% deviation (up or down) from 30-day baseline
Failover success rateApproved on fallback acquirer ÷ tx that reached fallbackOperator-set; fallback route quality determines the floorSet floor based on fallback acquirer contract and BIN coverageDailyDrop below operator-set floor on any fallback route
Routing rule exception rateTx not following intended routing policy ÷ total tx — covers fallback events, acquirer unavailability, BIN table gaps, rule overrides, and configuration errorsOperator-set; should trend toward zero for a well-maintained ruleset<1% of total tx; declining trend indicates rule quality improvingWeeklyStep-change increase indicates ruleset degradation or config issue
Cost Efficiency
Effective rate by routeTotal processing cost (MDR + scheme fees + cross-border + gateway fees) ÷ processed volume, per acquirer-MCC pair — expressed in basis pointsOperator-set; compare against contracted rate schedule per acquirerTrack drift vs contracted band; flag unexplained increasesMonthlySustained cost above contracted rate for the period
Interchange optimisation yieldbps recovered vs unoptimised interchange baseline — from Level 2/3 data submission, correct MIT/CIT classification, and network token qualificationOperator-set; yield depends on card mix, MCC, and data submission qualityTrack monthly; sustained decline warrants data submission quality investigationMonthlyYield decline >20% MoM without a corresponding traffic mix shift
Cross-border routing shareTx routed cross-border where a domestic routing option existed ÷ total tx with a domestic optionOperator-set; any non-zero rate represents addressable costMinimise; each point of avoidable cross-border routing adds scheme feesMonthlyStep-change increase indicates BIN routing gap or acquirer config issue
Latency
Authorisation latency P50 / P95 by acquirerms from auth request submitted to issuer response received, at P50 and P95, per acquirer and regionNo published benchmark; set target well below scheme auth timeoutOperator-set SLA per acquirer; track P95 for tail latency and checkout timeout riskDailyP95 sustained >200ms above acquirer baseline
Retry-overhead latencyAdditional ms added to total auth time on transactions requiring a retry, vs first-attempt approvalsOperator-set; retry paths add latency that affects checkout timeout budgetSet max retry budget consistent with checkout UX tolerance; monitor P95WeeklyRetry overhead exceeds defined budget on >X% of retried tx
Recovery
Retry win rate by decline codeApproved on retry ÷ eligible retried tx, segmented by ISO-8583 decline codeOperator-set; hard-decline codes (05 Do Not Honour, 41 Lost Card) should not be retried — win rate on these should be ~0%Code-level targets; rising win rate on hard codes indicates retry classification gapWeeklyWin rate on any soft-decline code drops >10 pp below 30-day baseline
Network token coverageTx with a network token (Visa VTS or Mastercard MDES) ÷ total eligible card-on-file txNo published threshold; Visa and Mastercard publish directional program-level data — treat as directional onlyOperator-set floor on eligible card-on-file base; investigate dropsMonthlyCoverage drops >5 pp month-over-month without a known cause
3DS step-up conversion rateCompleted 3DS challenges ÷ initiated 3DS challenges, by market and issuerOperator-set; varies by market, issuer implementation, and challenge UITrack by market; decline may indicate issuer OTP delivery issue or UX frictionMonthlyMarket-level drop >5 pp MoM without corresponding issuer event

Approval Performance

Authorisation rate by acquirer is the most direct measure of routing policy effectiveness, but it must be read at the per-acquirer level to be actionable. A blended auth rate tells you the weighted average output — not whether a 2 pp decline is attributable to one acquirer relationship degrading, a BIN range that should be on a different acquirer, or a shift in issuer risk appetite in a specific geography. Track the metric daily per acquirer and compare against an established baseline before any aggregation.

The network-decline reason code distribution is the early-warning layer beneath the auth rate. Different ISO-8583 codes indicate different issuer decisions. A spike in code 51 (Insufficient Funds) across a subscription rebill cohort may indicate a retry timing problem, not a fraud signal. A spike in code 05 (Do Not Honour) on new cards in a specific BIN range may indicate an issuer detecting a fraud pattern before your own controls have fired. Track the distribution weekly by issuer region and BIN; investigate any code that shifts more than 20% from its four-week average.

Soft declines — codes indicating the rejection may be reversible — are where intelligent retry logic pays off. The recovery rate differs by code and by retry timing. A blended soft-decline recovery rate that improves can hide a declining win rate on a specific code that drives most of your recoverable volume. Segment this metric by decline code, not in aggregate.

Routing Reliability

Primary acquirer success rate and failover invocation rate tell you whether traffic is flowing where routing policy intends. A step-change increase in failover invocation rate is a leading indicator of primary acquirer instability — it typically appears before auth rate drops, because fallback routes usually carry lower approval rates than the primary. Investigate a failover spike before waiting for the auth rate signal.

Failover success rate is the quality measure for the fallback path. A low failover success rate means the fallback route itself is underperforming — either due to the fallback acquirer’s own approval performance, BIN coverage gaps on the fallback route, or incorrect routing logic sending traffic to the wrong fallback for the BIN range. The multi-acquirer architecture behind failover routing is covered in Multi-Acquirer Routing: When and How to Add a Second PSP. For orchestration vendors that manage failover logic, see Spreedly vs Primer vs Gr4vy: Payment Orchestration Layer Compared.

Routing rule exception rate tracks the health of the ruleset itself. Every transaction that did not follow the intended routing policy — because of fallback, acquirer unavailability, a BIN table gap, a rule override, or a configuration error — represents either unintended cost or a governance gap. In payment orchestration setups, exception events are logged by the orchestration layer. A well-maintained ruleset trends toward zero exceptions. A step-change increase indicates either a ruleset change broke intended logic or an operational configuration issue that will compound if not addressed promptly.

Cost Efficiency

Effective rate by route is the most operationally useful cost metric because it captures the full economics of each routing path, not a blended average. An interchange-plus contract is the necessary prerequisite for per-route decomposition — blended-rate contracts obscure the breakdown between interchange, scheme fees, and acquiring markup, making it impossible to identify which route is contributing cost increases. Itemised statement data from an interchange-plus structure lets you calculate effective rate per acquirer-MCC pair and compare against the contracted rate schedule. Unexplained drift above the contracted rate typically indicates scheme fee category changes, avoidable cross-border routing, or MCC mis-classification. For a walkthrough of how processing statement line items map to cost components, see MDR Stack: Reading a Processing Statement Line by Line.

Interchange optimisation yield measures the basis points recovered versus what would have applied without optimisation. Level 2/3 data submission (purchasing card fields that qualify transactions for lower interchange tiers), correct MIT/CIT classification, and network token qualification all affect which interchange category applies. This yield is a data quality problem as much as a routing problem — a decline in yield without a corresponding shift in card mix usually indicates a data submission regression. The specific mechanism for cost-based routing across domestic schemes in markets like Australia — where the RBA mandates least-cost routing on dual-network debit — is covered in Least-Cost Routing: Sending Payments to the Cheapest Eligible Rail.

Cross-border routing share measures how much traffic is incurring cross-border fees when a domestic routing option existed. Every point of avoidable cross-border routing adds scheme assessment fees. The cause is usually a BIN routing table gap — the BIN was not mapped to the domestic acquirer — or a configuration issue routing a domestic card type through a foreign acquirer path. Track this monthly; a step-change increase is addressable through a BIN routing table audit.

Latency

Authorisation latency at P50 and P95, tracked by acquirer, connects routing performance to checkout UX. The only externally enforced ceiling is the scheme auth timeout — the maximum window before a transaction expires. Internal targets should be set well below that ceiling, leaving budget for processing jitter and retry overhead. P50 is the typical-case latency; P95 is where checkout timeout events actually occur. Tail latency is acquirer-specific and can differ materially between primary and fallback routes.

Retry-overhead latency is the additional time added to the auth path for any transaction requiring a retry attempt. A retry that adds 600ms to the auth path on 8% of transactions may not surface in aggregate latency reporting but will appear in checkout abandonment for users experiencing the delay. Set a retry overhead budget consistent with your checkout session timeout, and alert when P95 retry overhead exceeds it.

Recovery

Retry win rate by decline code is a quality metric for retry logic, not just a volume metric. Hard declines — codes like 05 (Do Not Honour), 41 (Lost Card), 43 (Stolen Card) — indicate definitive issuer rejections. Retrying these immediately does not change the outcome and may increase fraud signals. A non-zero retry win rate on hard decline codes does not indicate good retry performance — it indicates the retry classification logic is not correctly distinguishing hard from soft declines. Segment retry win rate by code and confirm hard-decline codes are routing to a customer communication path rather than a retry queue.

Network token coverage is a prerequisite metric for multi-acquirer routing on card-on-file businesses. Network tokens — Visa Token Service (VTS) and Mastercard MDES — are bound to a merchant ID, not to a specific PSP. This portability means stored credentials can be routed across acquirers without re-tokenisation. PSP tokens are locked to the issuing PSP and constrain which acquirers can process the credential. Low coverage limits multi-acquirer routing optionality on the stored credential base. A coverage drop usually indicates new card-on-file enrollments not tokenising — a missing VTS/MDES integration in a new checkout flow — or a PSP migration that left credentials in PSP-token-only state. For a full treatment of token portability trade-offs, see Network Tokens vs PSP Tokens: When Each Wins.

3DS step-up conversion rate matters where SCA applies or where issuers frequently request a challenge flow. A low step-up conversion rate means a significant share of auth attempts reaching the 3DS2 challenge screen are not completing. This abandonment feeds into auth rate as a non-approval outcome and is sometimes misclassified as an issuer decline rather than a consumer drop-off event. Track by market and issuer, and investigate drops not explained by a known issuer availability event.

Segmentation Discipline

The 15 metrics above have limited diagnostic value as blended totals. Every metric should be segmented before aggregating:

  • By acquirer — the primary dimension. Blended auth rate and effective rate hide per-acquirer differences entirely.
  • By BIN range — issuer behaviour, decline code patterns, and cross-border fee exposure all vary by BIN.
  • By issuer region — auth rate, network-decline patterns, and 3DS challenge rates differ by geography.
  • By currency and cross-border status — cross-border transactions carry structural cost and auth-rate differences that inflate blended totals.
  • By payment method — cards, A2A rails, and local payment methods have different approval, cost, and latency profiles.
  • By MIT vs CITmerchant-initiated transactions have different SCA rules, decline code distributions, and retry logic than customer-initiated transactions. Blending MIT and CIT auth rates is usually misleading for subscription businesses.
  • By retry path — first-attempt approvals and retry-path approvals have different cost and latency profiles; blending them hides retry overhead.

Report approval performance and routing reliability metrics daily to the routing operations team. Report cost efficiency and recovery metrics monthly to finance and leadership. Set escalation thresholds at the segment level — a BIN-level or acquirer-level anomaly is actionable; a blended change may not surface until it has already compounded.

Connecting the Operator KPI Scorecards

The routing scorecard is upstream of the fraud and chargeback scorecards — it does not operate in isolation.

The fraud operations scorecard sits downstream of routing decisions. Routing policies that send high-risk BIN ranges through detection paths with lower model coverage, or use soft-decline recovery to retry transactions without fraud re-scoring, can inflate fraud KPIs. Routing rule exceptions — transactions that did not follow the intended policy — may expose the fraud team to traffic they were not calibrated to handle.

The chargeback operations scorecard is the terminal downstream measure. Auth rate decisions that prioritise approval over fraud filtering create dispute liability. Interchange optimisation yield decisions — correct Level 2/3 data, accurate MIT/CIT classification — also affect the evidence available for dispute representment. Cross-border routing share and effective rate drift both feed into the cost-per-dispute metric tracked in the chargeback scorecard.

Reconcile all three scorecards monthly with risk and payments leadership. The connecting question at that review: which routing policy decisions from the prior period show up as fraud or chargeback anomalies, and what adjustment is required upstream.

Sources

Network token auth-rate impact varies by issuer and token program — Visa Token Service and Mastercard MDES publish directional uplift data

Network token uplift is published by Visa and Mastercard as program-level averages; actual impact varies by issuer, MCC, and token program implementation — treat as directional only, not as a universal routing performance target

Checked:

Multi-acquirer routing typically requires $5–10M monthly processing volume to justify orchestration build and reconciliation overhead

Volume threshold is a directional guideline; actual threshold depends on transaction mix, PSP contract structure, and orchestration build cost

Checked:

PSP-published ML routing results (Stripe PFM, Adyen Intelligent Routing) reflect those PSPs' specific traffic base — not universal routing performance benchmarks

Vendor-published figures are PSP-attributed; auth rate uplift, cost reduction, and false-decline recovery vary significantly by merchant baseline, traffic mix, and vertical

Checked:

Source types explained in our Methodology.

Shaun Toh By Shaun Toh · Director, Digital Payments · Razer

Subscribers get the PSP Selection RFP Kit — 60+ structured questions, evaluation scorecard, and negotiation playbook — delivered to your inbox instantly.

More Payments Economics briefings