api_limit
event is triggered immediately after a rate limit is exceeded for the global rate limit bucket for the Authentication or . If the number of request tokens utilized remains above 80% after one minute for the same rate limit bucket, a second warning log is generated. If a rate limit is exceeded for a different rate limit bucket, a new api_limit
event is generated. This helps customers identify which rate limit configuration their API calls are triggering, which is a critical first step in diagnosing the root cause.
api_limit_warning
log is triggered when a customer’s request rate consumes 80% of the request tokens for a given rate limit bucket. If the number of request tokens utilized remains above 80% after one minute for the same rate limit bucket, a second warning log is generated. If the 80% threshold is exceeded for a different rate limit bucket, a new api_limit_warning
log is created.
appi
log is triggered when a customer tenant with a Public Performance Burst add-on exceeds their sustained Authentication API request rate limit of 100 RPS, consuming a 15-minute block of their 48-hour burst allocation. If, after 15 minutes, the request rate exceeds the 100 RPS sustained request limit again, a second appi
log will be triggered.
error_description
query string parameter. For more information, see Affected endpoints and the JSON Error descriptions.
x-ratelimit-limit
: Maximum number of requests available.x-ratelimit-remaining
: Number of remaining requests available until the bucket is refilled with additional requests.x-ratelimit-reset
: UNIX timestamp, in seconds, of the expected time when additional requests will be added to the bucket.1000
100
requests per second
(on a fixed window)100 requests per second
on a fixed window.x-ratelimit-limit: 1000
x-ratelimit-remaining: 50
x-ratelimit-reset: 1675452600
1675452600
, or 7:30:00 PM UTC on February 3, 2023./ratelimitexample
with the following rate limit values:
200
response. The sixth request receives a 429
error because there are no remaining request tokens in the bucket.429
error.200
response./ratelimitexample2
with the following rate limit values:
200
response. The sixth request receives a 429
error because there are no remaining request tokens.429
error.200
response.Authentication flow | Flow type | Requests to Authentication API endpoints |
---|---|---|
Login | Username/Password Challenge* | 5 |
Login | 3rd Party Identity Provider – e.g., Social or Work Login | 6 |
Login | Auth0 Authentication Session Exists | 1 |
Signup | via Username/Password | 6 |
Modifier | Description | Additional Requests |
---|---|---|
ID First | Identifies the user before requesting credentials. | +2 |
MFA | Adds Multi-Factor Authentication. | +2 per factor |
OTP | One-time password for Authentication | +2 |
Enterprise Login | Authentication through an enterprise connection (e.g., SAML, OIDC, LDAP). | +1 |
Client Credentials | Used for machine-to-machine authentication. Applies universally, even if actions are used. | +1 |
Authentication flow | Flow type | Requests |
---|---|---|
Login | Username/password challenge | 8 |
Login | 3rd Party Identity Provider – e.g., Social or Work Login | 8 |
Login | Auth0 authentication session exists | 2 |
Signup | Username/password | 8 |
Modifier | Description | Additional Requests |
---|---|---|
SMS Authentication Only | When using SMS as the primary authentication method. | +7 |
Native Social Login | Login using a native social provider (e.g., Google, Facebook). | +1 |
Redirects | Additional redirects during authentication increase request count. | +1 |