Docs

Rate Limits on User/Password Authentication

Rate Limits on User/Password Authentication

For database connections Auth0 limits certain types of repeat login attempts depending on the user account and IP address, some of these limits are set as part of Anomaly Detection:

  • If a user enters their password incorrectly more than 10 times from a single IP address, they will be blocked from logging into that account from that IP address. Auth0 will send an email containing a link to unblock the user to the owner of the database account. This is the Brute Force Protection shield which is part of Auth0's Anomaly Detection.

  • If a user attempts to login 20 times per minute as the same user from the same location, regardless of having the correct credentials, the rate limit will come into effect. When this happens, the user can make 10 attempts per minute. Most endpoints at the moment support this rate limit, and soon all of them will.

Unblocking a User

If a user has triggered a block as part of anomaly detection, you can unblock the IP address using the remove IP block endpoint. For steps on how to unblock users on the dashboard, see Block and Unblock Users.

Why are some successful login attempts blocked?

To protect the health of the system overall, putting these restrictions in place help mitigate the load on our systems. Due to the high amount of customization Auth0 provides, we risk degradation of service from users that may perform high load stress or benchmark tests, as well as the possibility of bad code causing users to login multiple times.

Requests are subject to limits as outlined in the Rate Limit Policy for Auth0 APIs.

Click here to learn more about API Rate Limits