Authentication/End-user rate limits
This page provides the API rate limits for authentication and end-user activities, which is part of Okta rate limits.
Note:
- To learn more about rate limits, visit our overview and best practices pages.
- In addition to the rate limit per API, Okta implements limits on concurrent requests, Okta-generated email messages, end user requests, and home page endpoints. These limits are described on the Additional limits page.
- You can expand Okta rate limits upon request. To learn how, see Request exceptions and DynamicScale rate limits.
We enforce limits at the individual API endpoint level as requests per minute.
Action and Okta API Endpoint | Developer (free) | Developer (paid) | One App | Enterprise | Workforce Identity |
---|---|---|---|---|---|
Cumulative rate limit | 1,600 | 8,400 | 8,400 | 10,600 | 13,000 |
Authenticate different end users:/api/v1/authn | 100 | 600 | 600 | 600 | 500 |
Verify a factor:/api/v1/authn/factors/{factorIdOrFactorType}/verify only | 100 | 600 | 600 | 600 | 500 |
Get session information:/api/v1/sessions | 100 | 600 | 600 | 600 | 750 |
OAuth2 requests for Custom Authorization Servers:/oauth2/{authorizationServerId}/v1 except public metadata endpoints (see Note below) | 300 | 1,200 | 1,200 | 1,200 | 2,000 |
OAuth2 requests for the Org Authorization Server:/oauth2/v1 except /oauth2/v1/clients and public metadata endpoints (see Note below) | 300 | 1,200 | 1,200 | 1,200 | 2,000 |
All other OAuth2 requests:/oauth2 | 100 | 600 | 600 | 600 | 600 |
/app/{app}/{key}/sso/saml | 100 | 600 | 600 | 600 | 750 |
/app/office365{appType}/{key}/sso/wsfed/active | N/A | N/A | N/A | 2,000 | 1,000 |
/app/office365{appType}/{key}/sso/wsfed/passive | N/A | N/A | N/A | 250 | 250 |
/app/template_saml_2_0/{key}/sso/saml | 100 | 600 | 600 | 600 | 2,500 |
/login/login.htm | 100 | 600 | 600 | 600 | 850 |
/login/sso_iwa_auth | 100 | 600 | 600 | 600 | 500 |
/api/{apiVersion}/radius | 100 | 600 | 600 | 600 | 600 |
/idp/idx | 100 | 600 | 600 | 600 | 500 |
Note: The following public metadata endpoints aren't subjected to rate limiting.
Public metadata endpoints for Org Authorization Server are:
/oauth2/v1/keys
/.well-known/openid-configuration
/.well-known/oauth-authorization-server
Public metadata endpoints for Custom Authorization Servers are:
/oauth2/{authorizationServerId}/v1/keys
/oauth2/{authorizationServerId}/.well-known/openid-configuration
/oauth2/{authorizationServerId}/.well-known/oauth-authorization-server