Skip to main content
The Sessionboard Public API enforces rate limits to ensure fair usage and platform stability. Rate limits are applied per API token with separate counters for each category.

Limits by Endpoint

Rate-limited endpoints are grouped into independent buckets. Each bucket tracks its own counter, so hitting the limit on writes won’t block your reads.
CategoryLimitWindowEndpoints
Entity reads10015 minutesGET single session, contact, exhibitor, sponsor; GET field, room, track, tag, format, level, language, status lists
Session writes10015 minutesPOST /create, PUT, DELETE, POST /restore, POST /bulk for sessions
Contact writes10015 minutesPOST /create, PUT, DELETE, POST /restore, POST /bulk for contacts
Exhibitor writes10015 minutesPOST /create, PUT, DELETE, POST /restore, POST /bulk for exhibitors
Sponsor writes10015 minutesPOST /create, PUT, DELETE, POST /restore, POST /bulk for sponsors
Field writes10015 minutesPOST /create, PUT, DELETE for custom fields
Metadata writes10015 minutesPOST /create, PUT, DELETE for rooms, tracks, tags, formats, levels, languages, statuses
Event management writes10015 minutesAgenda drafts, draft sessions, scheduling rules, personas, dashboards, widgets, saved reports
Insights & SbQL10015 minutesAll /insights/* and /event/{eventId}/insights/* endpoints

Endpoints without rate limits

The following endpoints do not enforce rate limits. They are legacy endpoints that query the database directly:
  • GET /v1/events — list events
  • POST /v1/event/{eventId}/sessions — search sessions
  • POST /v1/event/{eventId}/contacts — search contacts
  • POST /v1/event/{eventId}/sponsors — search sponsors
  • POST /v1/event/{eventId}/exhibitors — search exhibitors
  • POST /v1/event/{eventId}/speakers — search speakers
  • GET /v1/event/{eventId}/speakers/{contactId} — get speaker
  • POST /v1/event/{eventId}/fields — search fields
  • POST /v1/event/{eventId}/{rooms,tracks,tags,formats,levels,languages} — search metadata
  • POST /v1/event/{eventId}/sessions/status — search sessions by status
  • POST /v1/event/{eventId}/session-statuses — search session statuses
  • GET/POST /v1/gdpr/requests — GDPR endpoints
  • GET /v1/event/{eventId}/contacts/{contactId}/sessions — contact sessions
  • GET /v1/organization/{orgId}/contacts/* — org-level contact endpoints
Even though these endpoints don’t enforce rate limits today, we recommend building your integration to handle 429 responses gracefully in case limits are added in the future.

Response Headers

Rate-limited endpoints include these headers on every response (both successful and rate-limited):
HeaderDescription
RateLimit-LimitMaximum requests allowed in the current window
RateLimit-RemainingRequests remaining in the current window
RateLimit-ResetUnix timestamp (seconds) when the window resets

Exceeding the Limit

When you exceed the rate limit, the API returns a 429 status with a Retry-After header:
HTTP/1.1 429 Too Many Requests
RateLimit-Limit: 100
RateLimit-Remaining: 0
RateLimit-Reset: 1711900800
Retry-After: 45
{
  "error": "TooManyRequestsError",
  "message": "Error while trying to reach the endpoint: Too many requests"
}

Custom Rate Limits

By default, each API token is limited to 100 requests per 15 minutes per category. If your integration requires a higher throughput, contact Sessionboard support to request an elevated rate limit for your token. Custom limits are applied per token and override the default for all rate-limited buckets. The 15-minute window stays the same — only the request count changes. For example, a token with a custom limit of 1,000 can make up to 1,000 requests per 15 minutes in each category.
When a custom rate limit is active, the RateLimit-Limit header reflects the token’s custom value, not the default 100.

Best Practices

Cache responses

Cache API responses locally to reduce the number of requests. Many endpoints return data that doesn’t change frequently.

Use pagination

Use page and pageSize parameters to fetch only the data you need instead of requesting large datasets.

Handle 429 gracefully

When you receive a 429 response, wait for the Retry-After duration before making another request. Implement exponential backoff for retries.

Batch operations

Where possible, use bulk endpoints instead of making many individual requests. Bulk operations count as a single request against the rate limit.

Rate Limits by Auth Method

Auth MethodLimitNotes
API Token (x-access-token)100 req / 15 minPer token, per category
OAuth Bearer Token100 req / 15 minPer token, per category
UnauthenticatedBlockedAll endpoints require authentication