Skip to content

Rate limits & SLAs

At launch, RandaVerify does not enforce a hard request-rate cap on Self-Hosted integrators. The practical limits are:

  • Concurrent connections per token: 32. Beyond this, additional requests are queued at the load balancer.
  • NIMC upstream throughput is the actual bottleneck. Burst traffic above ~5 requests/sec/org is likely to see queueing latency.
  • We reserve the right to introduce a 429 Too Many Requests response if any single org’s volume jeopardises platform stability. You will be notified by email at least 7 days before enforcement begins.

If your use case requires guaranteed throughput beyond the above, contact support for a discussion.

Endpointp50p95
/login200 ms600 ms
/verify-nin1.2 s4 s
/verify-nin/in-person2.5 s6 s
/verify-nin/share-code1.4 s4.5 s
/verify-nin/phone1.4 s4.5 s
/verify-nin/demography1.4 s4.5 s
/verify-nin/requery (local hit)80 ms250 ms
/verify-nin/requery (NIMC fallback)1.2 s4 s

These are measured at the RandaVerify edge — your actual experience will include your own network’s RTT.

Set a 45-second client timeout on verification calls to be safe.

Target: 99.5% monthly uptime at launch. Planned maintenance windows are communicated by email at least 48 hours in advance and scheduled outside of Nigerian business hours where possible.

NIMC upstream outages are outside our control and are passed through as 5xx responses. We do not deduct units for requests that failed due to NIMC unavailability.

A public status page is on the roadmap. Until it ships, support will email all customers within 30 minutes of any incident affecting verification availability.