We are making org-wide rate limits more granular, and treating authenticated end-user interactions separately. More granular rate limits will further lessen the likelihood of calls to one URI impacting another. Treating authenticated end-user interactions separately will lessen the chances of one user's impacting another. We're also providing a transition period so you can see what these changes will look like in your Okta system log before enforcing them:
Of course, as each change is released, we'll announce the change here.
For a full description of the rate limit changes, see API Rate Limits.
/api/v1/apps API sometimes incorrectly returned null for the realm or groupName
attribute for a Template WS-Fed application. (OKTA-117274)/api/v1/idps/{idpId} API sometimes incorrectly returned an HTTP response code of 500
rather than 400. (OKTA-117691)/api/v1/idps API improperly allowed social identity providers to be created
when the administrator did not have sufficient permissions. Those providers could not be used. (OKTA-118067)/api/v1/apps API returned an incorrect number of app instances when pagination and permissions
filtering were both in effect. (OKTA-113411)