On This Page

Client-based rate limits

Client-based rate limiting for the /authorize endpoint uses a combination of the Client ID, user's IP address, and Okta device identifier to provide granular isolation for requests made to the /authorize endpoint. This framework isolates rogue OAuth clients and bad actors, thereby ensuring valid users and applications don't run into rate limit violations.

The /authorize endpoint is the starting point for OpenID Connect flows such as the Implicit flow or the Authorization Code flow. A request to this endpoint authenticates the user and either returns an authorization code or tokens to the client application as part of the callback response.

Currently, client-based rate limits apply to the OAuth /authorize endpoint on both the Okta Org Authorization Server and any Custom Authorization Server. All Custom Authorization Servers share a rate limit. The Org Authorization Server has a separate rate limit.

Each valid request made by a user to this endpoint is counted as one request against the respective authorization server rate limit bucket (/oauth2/{authorizationServerId}/v1 (Custom Authorization Server) or /oauth2/v1 (Okta Org Authorization Server)). The per minute rate limits on these endpoints apply across an Okta tenant.

For example, example.com has 10 OAuth applications running in a production environment. Bob's team is launching a new marketing portal that is a single page OAuth application. Unaware of the rate limits on the /authorize endpoint, Bob's team begins running some batch testing scripts against the newly created application that makes hundreds of /authorize requests in a single minute. Without the client-based rate limiting framework, the new marketing portal application could potentially consume all of the per minute request limits assigned to example.okta.com and thereby cause rate-limit violations for the rest of the users that access the other OAuth applications.

Client-based rate limiting can be helpful in the following scenarios:

  • You have several OAuth applications that are split across multiple teams. You need to ensure that one OAuth application doesn't consume all of the assigned per minute request limits.
  • You want to isolate any rogue OAuth applications from other valid OAuth applications.
  • You want to ensure that every application team adheres to best-coding practices, such as proper error handling to prevent redirect loops.
  • You want protection against random synthetic tests or batch jobs in production that make numerous requests every minute.

How it works

The best way to describe how client-based rate limiting works is to provide some example use cases.

Client-based isolation for a unique IP address

Bob and Alice are working from home and have distinct IP addresses. Both Bob and Alice try to sign in to their company's portal application (clientID: portal123) at the same time. When they make the authorize request to https://company.okta.com/oauth2/v1/default/authorize?clientId=portal123, the client-based rate-limiting framework creates a unique per minute request quota for both Bob and Alice using their IP address and the OAuth client ID that they are trying to access.

  • Bob: (IP1 + portal123) Gets a quota of 60 total requests per minute and a maximum of two concurrent requests
  • Alice: (IP2 + portal123) Gets a quota of 60 total requests per minute and a maximum of two concurrent requests

Let's assume the org-wide quota for the /authorize endpoint is a total of 2,000 requests per minute on Custom Authorization Servers. Bob decides to run a batch job that triggers about 2,000 /authorize requests per minute.

Without the client-based rate-limiting framework, Bob consumes all of the total allowed requests per minute (2,000 requests per minute). This results in HTTP 429 errors for both Bob and Alice, which makes the application inaccessible for everyone.

With the client-based rate-limiting framework enabled, after Bob exceeds his individual limit of 60 requests per minute, HTTP 429 errors are sent. Requests that originate from Bob's IP address, and the specific device from which the requests are made, start receiving the errors. Alice continues to access the application without any issues.

Client-based isolation for a unique IP address

Client-based isolation for users accessing /authorize from a NAT IP

Alice, Bob, and Lisa all work from the same office. Since they access Okta through a Network Address Translation (NAT) IP from their office network, everyone shares the same IP address. When they make the authorize request to https://company.okta.com/oauth2/v1/default/authorize?clientId=portal123, the client-based rate-limiting framework creates a unique per minute request quota from the combination of every user's IP address, OAuth client ID of the application, and the device identifier set by Okta in each user's browser.

Client-based isolation for users accessing the authorize endpoint from a NAT IP

  • Alice: (NAT IP + portal123 + Device1 ID) Gets a quota of 60 total requests per minute and a maximum of two concurrent requests
  • Bob: (NAT IP + portal123 + Device2 ID) Gets a quota of 60 total requests per minute and a maximum of two concurrent requests
  • Lisa: (NAT IP + portal123 + Device3 ID) Gets a quota of 60 total requests per minute and a maximum of two concurrent requests

Note: The device identifier is derived from a cookie (dt cookie) that Okta sets in the browser when the first request is made to Okta. When the requests are made using a non-browser client, the device cookie isn't present. In that case, such requests fall under a common quota with the device identifier being null (NAT IP + portal123 + null).

Client-based isolation for users accessing /authorize through a proxy

When /authorize requests are made from behind a proxy IP address, make sure to configure the respective IPs as proxies. This allows the client-based rate-limiting framework to look for the IP address before the proxy to find the true client IP address.

Client-based rate-limiting modes

The client-based rate-limiting framework can exist in one of three modes:

Mode Description
Enforce and log per client (recommended) Rate limiting is based on client-based rate-limiting values. Client-specific rate limiting violation information is logged as System Log events.
Log per client Rate limiting is based on the org-wide Rate Limit values, but client-specific rate limiting violation information is logged as System Log events.
No action Rate limits aren't enforced at the client-specific level. Rate limiting is based on the org-wide Rate Limit values.

System Log events

When an individual user violates their assigned per minute requests limit, then depending on which mode is set, a System Log event is fired:

  • system.client.rate_limit.violation: This event is fired when the framework is in Enforce and log per client mode and a specific client, IP address, or device identifier combination exceeds the total limit of 60 requests per minute. The System Log contains information about the client ID, IP address, device identifier, and the actual user if the user already has a valid session.

  • system.client.concurrency_rate_limit.violation: This event is fired when the framework is in Enforce and log per client mode and a specific client, IP address, or device identifier combination makes more than two concurrent requests. The System Log contains information about the client ID, IP address, device identifier, and the actual user if the user already has a valid session.

  • system.client.rate_limit.notification: This event is fired when the framework is in Log per client mode and a specific client, IP address, or device identifier combination exceeds the total limit of 60 requests per minute. However, the end user won't see a rate-limit violation. Okta fires only a notification System Log event. The System Log contains information about the client ID, IP address, device identifier, and the actual user if the user already has a valid session.

  • system.client.concurrency_rate_limit.notification: This event is fired when the framework is turned on in Log per client mode and a specific client, IP address, Device token combination makes more than two concurrent requests. However, the end user won't see a rate-limit violation. Okta fires only a notification System Log event. The System Log contains information about the client ID, IP address, Device identifier, and the actual user if the user already has a valid session.

Check your rate limits with Okta Rate Limit headers

The Rate Limit headers returned when client-based rate limiting is enabled are very similar to the headers returned through the org-wide Rate Limits. The difference is that the header value is specific to a given client/IP/device combination rather than the org-wide Rate Limit values. Okta provides three headers in each response to report client-specific rate limits.

Note: If client-based rate limiting is in Log per client or No action mode, headers that are returned still reflect the org-wide rate limits.

For client-specific rate limits, three headers show the limit that is being enforced, when it resets, and how close you are to hitting the limit:

  • X-Rate-Limit-Limit - The rate limit ceiling that is applicable for the current request to the specific client/IP/device identifier combination
  • X-Rate-Limit-Remaining - The number of requests left until the limit is hit for the specific client/IP/device identifier combination during the current rate-limit window
  • X-Rate-Limit-Reset - The time when the rate limit resets, specified in UTC epoch time for the specific client/IP/device identifier combination

For example:

HTTP/1.1 200 OK
X-Rate-Limit-Limit: 60
X-Rate-Limit-Remaining: 35
X-Rate-Limit-Reset: 1516307596

When a specific client/IP/device identifier combination exceeds either the 60 requests per minute request limit or the concurrent limit (two concurrent requests), then the /authorize request returns an HTTP 429 error.

How to enable this feature

Note: For all orgs created after September 2020, this feature is automatically set to the Enforce and log per client (recommended) mode.

To configure client-based rate limiting for existing orgs:

Note: The Admin Console is required for these steps. If you see Developer Console in the top left of the page, click it and select Classic UI to switch.

  1. From the Admin Console select Settings > Account, and then scroll down to the Client-based rate limiting section.

  2. Select the type of Rate limit per client that you want to implement:

    • Select Log and enforce client (recommended) to enable client-based rate limiting.

    • Select Log per client to enable client-based rate limiting in preview mode. In Log per client mode, rate limiting is based on the org-wide rate-limit values, but client-specific rate limiting error information is logged as System Log events. By analyzing these System Log events, you can determine if client-based rate limiting is effective for you.

    • Select No action to disable client-based rate limiting.

Frequently asked questions

Q: Which endpoints are covered under client-based rate limiting?

Currently, client-based rate limiting only applies to an authorization server's /authorize endpoint.

Q: How is the client-specific rate limit determined?

The client rate-limiting framework calculates the per client rate limit based on the OAuth client ID, the user's IP address, and the Okta device identifier (the Okta device identifier that Okta sets in the browser).

Q: What happens if my network contains a proxy server through which the requests are proxied?

Requests would appear to come from the same IP Address. When /authorize requests are made from behind a proxy IP address, make sure to configure the respective IPs as proxies. This allows the client-based rate-limiting framework to look for the IP address before the proxy to find the true client IP address.

Q: Can I update the per client rate limiting today?

No. Today every client ID/IP/device identifier combination gets 60 total requests per minute and a maximum of two concurrent requests.

Q: Does the org-wide rate limit still apply when I enable client-based rate limiting?

Yes. When the cumulative total request or maximum concurrent requests from every unique client exceeds the org-wide rate limits, your Okta org experiences org-wide rate-limit errors.

Q: Would the rate-limit headers returned by Okta on the /authorize endpoint reflect client-specific rate limits?

Yes. The header value is specific to a given client/IP/device combination rather than the org-wide rate-limit values.

Q: How can I find out if client-based rate limiting would be effective for my Okta tenant?

You can set the client-based rate limiting framework to Log per client mode. In Log per client mode, rate limiting is based on the org-wide rate-limit values, but client-specific rate limiting error information is logged as System Log events. By analyzing these System Log events, you can determine if client-based rate limiting is effective for you.

Q: Where does Okta get the device identifier from?

The device is identified using the dt cookie that Okta sets in the browser when the first request is made to Okta from the browser.