On this page
Rate limits overview
To protect the service for all customers, Okta APIs are subject to rate limiting. These limits mitigate denial-of-service attacks and abusive actions such as rapidly updating configurations, aggressive polling and concurrency, or excessive API calls.
The Okta API rate limits are divided into three categories: authentication/end user, management, and other endpoints. Each category has APIs with rate limits that are enforced individually as well as a cumulative rate limit. The rate limits vary by service subscription (opens new window).
To access the individual API limits, visit a category page by clicking the appropriate category link in the table.
We enforce the following per-minute limits.
|Category||Developer (free)||Developer (paid)||One App||Enterprise||Workforce Identity|
If any org-wide rate limit is exceeded, an HTTP 429 status code is returned. You can anticipate hitting the rate limit by checking Okta's rate limiting headers. Additionally, you are sent an email notification when your org approaches its rate limit.
- In addition to the rate limit per API, Okta implements limits on concurrent requests, Okta-generated email messages, end user requests, and home page endpoints. These limits are described on the Additional limits page.
- DynamicScale rate limits apply to a variety of endpoints across different APIs for customers that purchased this add-on.
- Rate limits may be changed to protect customers. We provide advance warning of changes when possible.
- You can expand the Okta rate limits upon request. To learn how, see Request exceptions and DynamicScale rate limits.
- Review the Rate limit best practices for further information on monitoring and managing your rate limits.
Okta API Tokens are, by default, configured to have 50% of an API endpoint's rate limit when created through the Admin Console. This configuration avoids one API token exceeding the endpoint's rate limit violation in an org with multiple API tokens. To adjust the default API token capacity value from 50%, you can edit the percentage value in the Admin Console. See Set token rate limits (opens new window). Reducing the capacity percentage per API token prevents one API token from consuming the entire endpoint rate, assists with investigating rate-limit violations, and prevents future violations.
The Admin Console tracks any rate-limit warnings or violations directly in a Rate Limit Monitoring widget. By default, only the last hour of warnings or violations appear, but you can also check for events within the last 24 hours or the last seven days from the dropdown menu. Selecting View at the top of the widget takes you to the Rate Limits dashboard for further investigation. If individual rate-limit violations appear in the widget, you can access affected API usage in the Rate Limits Dashboard by clicking the API link in the widget.
Okta provides rate limits for orgs based on the traffic that they expect to have. If your org experiences higher traffic than what is expected, this unplanned use may potentially have an impact on end users. To ensure that our customers are successful and to help minimize impact, Okta doesn't suspend use that is above the rate limit (specifically for authentication and authorization flows). In the event that there is sustained use above the purchased rate limit, Okta requires that you purchase an applicable offering that is in line with your use. By making burst rate limits available, Okta provides peace of mind by ensuring that an unplanned spike doesn't detrimentally affect the end user's experience.
In a typical use case scenario where orgs exceed a default rate limit, they receive a system log warning event, a burst event, and then a violation event. For example, an org has a rate limit of 600 requests per minute on the
/api/v1/authn endpoint. That org would receive a warning at 360 requests per minute (60%) of 600. That org would get a burst notification when the endpoint hits 600 requests per minute and then the violation event when it hits 3000 requests all in the same minute.
Additionally, burst rate limits typically apply on top of any rate limit increase that an org may have, such as DynamicScale. For example, the default limit on
/api/v1/authn is 600 requests per minute. If an org is expecting traffic to require 6000 requests per minute, the org would purchase DynamicScale 10x. The burst rate limit in this scenario would provide 5x coverage on top of the 6000 and ensure peace of mind for any unplanned spike in use.
On the rate limit dashboard, the trendline can now exceed 100% of the org's default rate limit (up to 5x the default with the buffer zone) as shown in the following example.
When a burst rate limit event occurs, the
system.org.rate_limit.burst system log event is triggered and an email notification is generated.
The email is sent to the same admin who received the
system.org.violation event emails.
Rate limit dashboard: The rate limit dashboard helps you understand the rate limit and current use of an API. The dashboard provides you with the ability to track the API's use and to notify you with alerts when the API is about to hit or has hit the rate limit. You can also use the multiple views of data use on the dashboard to investigate high usage or rate limit violations.
Rate limit best practices for further information on best practices to monitor and manage your rate limits.
Concurrent rate limits: To protect the service for all customers, Okta enforces concurrent rate limits, which is a limit on the number of simultaneous transactions. Concurrent rate limits are distinct from the org-wide, per-minute API rate limits, which measure the total number of transactions per minute. Transactions are typically very short-lived. Even very large bulk loads rarely use more than 10 simultaneous transactions at a time.
Client-based rate limits: To provide granular isolation, client-based rate limiting uses a combination of the client ID/IP address/device identifier for requests made to the OAuth 2.0
/authorizeendpoint or the IP address/device identifier for requests made to the
/login/login.htmendpoint. This framework isolates OAuth 2.0 clients that are generating unexpected traffic, thereby it ensures valid users and applications don't run into rate limit violations.
DynamicScale rate limits: If your needs exceed Okta's default rate limits for the base product subscriptions (One App or Enterprise) that you've already purchased, the DynamicScale add-on service grants you higher limits for a variety of endpoints across different APIs.
End-user rate limits: Okta limits the number of requests from the Admin Console and End-User Dashboard to 40 requests per user per 10 seconds per endpoint. This rate limit protects users from each other and from other API requests in the system.
Home page endpoints and per-minute limits: These endpoints are used by the Okta home page for authentication and user sign in and have org-wide rate limits.
Okta API endpoints and per-user limits: API endpoints that take username and password credentials, including the Authentication API and the OAuth 2.0 resource owner password flow, have a per-username rate limit to prevent brute force attacks with the user's password. SMS and Call factor endpoints also have a per-username rate limit.
Okta-generated email message rate limits: These rate limits vary by email type. Okta enforces rate limits on the number of Okta-generated email messages that are sent to customers and customer users. For example, if the number of emails sent to a given user exceeds the per-minute limit for a given email type, subsequent emails of that type are dropped for that user until that minute elapses.