Documentation Index
Fetch the complete documentation index at: https://docs.bindbee.dev/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Bindbee enforces rate limits to ensure fair usage and maintain service reliability for all customers. All API endpoints are subject to rate limiting to protect our infrastructure and provide consistent performance.Rate Limit Policy
Current Rate Limit: 200 requests per minute per connector The Bindbee API enforces rate limits based on the connector (as indicated by theconnector_token in the request header). This means each of your end users has their own independent rate limit of 200 requests per minute.
This rate limit applies across all endpoints and is enforced strictly. Once a connector reaches the limit, subsequent requests for that connector will be rejected with a 429 Too Many Requests error until the rate limit window resets.
Rate limits are applied per connector token, not per API key. This ensures
fair resource allocation across all your end users’ connections.
Rate Limit Headers
Bindbee includes rate limit information in the response headers of every API request, allowing you to monitor your usage and implement appropriate backoff strategies.Successful Requests (2xx Status)
When your request is successful, the following headers are included:| Header | Description | Example |
|---|---|---|
X-RateLimit-Limit | The maximum number of requests allowed per minute | 200 |
X-RateLimit-Remaining | The number of requests remaining in the current window | 157 |
X-RateLimit-Reset | Unix timestamp (in seconds) when the rate limit will reset | 1700000000 |
Rate Limit Exceeded (429 Status)
When you exceed the rate limit, you’ll receive a429 Too Many Requests response with the following headers:
| Header | Description | Example |
|---|---|---|
X-RateLimit-Limit | The maximum number of requests allowed per minute | 200 |
X-RateLimit-Remaining | Always 0 when rate limited | 0 |
X-RateLimit-Reset | Unix timestamp (in seconds) when you can retry | 1700000060 |
Retry-After | Number of seconds to wait before retrying | 60 |
Best Practices
1. Monitor Rate Limit Headers
Always check theX-RateLimit-Remaining header to track your usage and adjust your request frequency accordingly.
2. Implement Retry Logic with Backoff
When you receive a429 response, wait for the duration specified in the Retry-After header before retrying.
3. Distribute Requests Across Multiple Connectors
Since rate limits are per connector, requests for different end users (different connector tokens) have independent rate limits. You can process multiple connectors in parallel without affecting each other’s rate limits.4. Batch Requests When Possible
Reduce the number of API calls by using batch endpoints or requesting multiple resources in a single call where supported.5. Implement Rate Limit Tracking
Track rate limit usage across your application to proactively avoid hitting limits.Calculating Time Until Reset
TheX-RateLimit-Reset header contains a Unix timestamp. You can calculate the wait time as follows:
Need Higher Limits?
If your application requires higher rate limits for specific connectors or use cases, please contact our support team at support@bindbee.dev or reach out to your account manager. We offer custom rate limits for enterprise customers based on your specific needs.Common Questions
What happens if I exceed the rate limit?
Your requests for that specific connector will be rejected with a429 Too Many Requests status code until the rate limit window resets (60 seconds from when you first exceeded the limit).
Does the rate limit apply per endpoint or across all endpoints?
The rate limit applies across all endpoints for a given connector. All requests made with the sameX-Connector-Token count toward the same 200 requests per minute limit.