Rate Limits Overview
Beyond Identity Workforce APIs are subject to rate limits to protect the Beyond Identity systems for all of our customers. These limits mitigate impacts from problems like DoS attacks, improperly configured scripts and clients, or excessive polling.
The classes of API endpoints that have rate limits applied are below. We are continually adding new endpoints to this list.
API Endpoint | Per-minute API calls |
SCIM: Users and Groups APIs | 30 |
Customers should not notice any impact on their API calls, as most clients programmatically handle rate limits and can back off and retry requests appropriately.
Requesting a higher limit
If your system needs a higher limit, overrides can be set. Please contact our support team with the details of the API endpoint, the requested limit, and the reasoning.
How to identify rate limiting
When a request exceeds a rate limit, our application server returns an HTTP 429 status code and RateLimit-* headers, as described in RateLimit Header Fields for HTTP. Example response:
HTTP/1.1 429 Too Many Requests
RateLimit-Limit: 30
RateLimit-Remaining: 0
RateLimit-Reset: 7
SCIM clients built into Okta, Azure AD, ForgeRock, Ping, and other common Identity Providers state that their SCIM clients handle 429 responses with appropriate backoff and retry approaches.
Comments
0 comments
Please sign in to leave a comment.