A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://developer.okta.com/docs/api/getting_started/rate-limits below:

Rate limits | Okta Developer

API rate limits by API token or OAuth 2.0 app

Rate limits overview

To protect the service for all customers, Okta APIs are subject to rate limits. These limits mitigate denial-of-service attacks and abusive actions such as rapidly updating configurations, aggressive polling and concurrency, or excessive API calls.

The Okta API rate limits are divided into the following categories: authentication/end user and management. Each category has APIs with rate limits that are enforced individually. The rate limits vary by service subscription (opens new window).

If any org-wide rate limit is exceeded, an HTTP 429 status code is returned. You can anticipate hitting the rate limit by checking the Okta rate limiting headers. Also, you’re sent an email notification when your org approaches its rate limit.

Notes:

API rate limits by API token or OAuth 2.0 app

By default, Okta API tokens and OAuth 2.0 apps are configured to use 50% of an API endpoint's rate limit when they're created through the Admin Console. This configuration prevents a single API token or OAuth 2.0 app from exceeding the endpoint's rate limit in an org with multiple API tokens or apps.

To adjust the default rate limit capacity for API tokens or OAuth 2.0 apps from 50%, you can edit the percentage value in the Admin Console. See Set token rate limits (opens new window) for API tokens and Set the app rate limits (opens new window) for OAuth 2.0 apps. You can also use the Principal Rate Limits API (opens new window) to configure your API token or OAuth 2.0 app. Reducing the capacity percentage helps prevent a single API token or OAuth 2.0 app from consuming the entire endpoint rate, assists with investigating rate-limit violations, and reduces the likelihood of future violations.

The Admin Console tracks any rate-limit warnings or violations directly in a rate limit monitoring widget. By default, only the last hour of warnings or violations appear. You can also check for events within the last 24 hours or the last seven days from the dropdown menu. Selecting View at the top of the widget takes you to the Rate Limits dashboard for further investigation. If individual rate-limit violations appear in the widget, you can access affected API usage in the rate limits Dashboard by clicking the API link in the widget.

Burst rate limits

Okta provides rate limits for orgs based on their expected traffic. If your org experiences higher traffic than what is expected, this unplanned usage may have an impact on end users.

To help minimize this impact, Okta uses burst rate limits, which offer 5x the capacity of the base rate limit. With burst rate limits, Okta doesn't suspend use that's above the established rate, specifically for authentication and authorization flows (except in rare scenarios of reduced resources). However, if there’s a sustained use above the purchased rate limit, Okta requires you to purchase an applicable offering that matches your use. With burst rate limits, Okta provides peace of mind by ensuring that, in most cases, an unplanned spike doesn't detrimentally affect the end user's experience.

Note: Burst rate limits don't apply when the concurrency rate limit threshold has been reached or exceeded for an org. While rare, burst rate limits may also not apply due to resource constraints at the time of the request.

In a scenario where orgs exceed a default rate limit, they receive a System Log warning event, a burst event, and then a violation event. For example, an org has a rate limit of 600 requests per minute on the /api/v1/authn endpoint. That org would receive a warning at 360 requests per minute (60% of 600). That org would get a burst notification when the endpoint hits 600 requests per minute. And then the violation event when it hits 3000 requests all in the same minute.

Also, burst rate limits typically apply on top of any rate limit increase that an org may have, such as DynamicScale. For example, the default limit on /api/v1/authn is 600 requests per minute. If an org is expecting traffic to require 6000 requests per minute, the org would purchase DynamicScale 10x. The burst rate limit in this scenario provides 5x coverage on top of the 6000 and ensures peace of mind for any unplanned spike in use.

On the rate limit dashboard, the trendline can now exceed 100% of the org's default rate limit (up to 5x the default with the buffer zone) as shown in the following example.

When a burst rate limit event occurs, the system.org.rate_limit.burst System Log event is triggered and an email notification is generated.

The email is sent to the same admin who received the system.org.warning and system.org.violation event emails.

Other applicable rate limit content

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4