Rate Limits

Learn about API rate limits and how to work with them.

Ironclad CLM Limits

These API limits are set on a per account basis.

EndpointLimit
GET Workflows*400 requests per minute
POST/PATCH Workflows*40 requests per minute
GET Records*600 requests per minute
POST/PATCH Records*200 requests per minute
GET/PUT/POST scim/v2/users*600 requests per minute
PATCH/DELETE scim/v2/users*50 requests per minute
All scim/v2/groups*600 requests per minute
Webhooks Endpoints600 requests per minute
All other APIs800 requests per minute

Handling limiting gracefully

If the rate limit is exceeded, the API responds with a 429 Too Many Requests status code. A basic technique for integrations to gracefully handle limiting is to watch for 429 status codes and build in a retry mechanism. The retry mechanism should follow an exponential backoff schedule to reduce request volume when necessary. We’d also recommend building some randomness into the backoff schedule to avoid a thundering herd effect.

Tips to avoid hitting API limits

Cache data for repeat calls

If your site or app uses data from Ironclad on each page load, that data should be cached and loaded from that cache instead of being requested from the Ironclad APIs each time.

Use Async APIs and Webhooks

When possible, it is best practice to create workflows asynchronously for non-blocking performance. This document also has more information about how to launch workflows.

Ironclads' Webhooks allow users to receive updates to many types of events that happen in the Ironclad CLM environment. Webhooks do not count towards the API limits. More information about Ironclad's webhooks can be found here.

Load testing

Some users prepare to launch an Ironclad CLM API integration by load testing the application in their demo environment. We generally discourage this practice because API limits are lower in test mode, so the load test is likely to hit limits that it wouldn’t hit in production.

Other limits

Notwithstanding the limits specified in this document, the system might still limit requests if it detects an unusual spike in requests from all sources for the account, including internal product requests. For example, in a denial of service attack. Please see our API Terms of Use for more information.