What is a Per-User Rate Limit?

2 min read Updated

Rate limits scoped to individual users or agent identities rather than applied globally. Ensures one agent cannot consume another's quota, enabling fair resource allocation in multi-tenant MCP deployments.

WHY IT MATTERS

In any shared system, a global rate limit creates a tragedy of the commons. If five agents share a global limit of 100 calls per minute, one aggressive agent can consume all 100 — starving the other four. Per-user rate limiting solves this by giving each agent its own quota.

Identity-scoped limits are essential in production MCP deployments. A team might run multiple agents against the same MCP server — a coding assistant, a monitoring bot, and a deployment agent. Each has different throughput needs and risk profiles. Per-user limits let operators tailor quotas to each agent's role.

Per-user limits also improve security posture. If an agent's credentials are compromised, the attacker's blast radius is bounded by that agent's individual quota rather than the global capacity of the system. This containment is critical when MCP servers wrap sensitive infrastructure.

HOW POLICYLAYER USES THIS

Intercept identifies agents by their connection identity and applies rate limits per user or per agent as defined in the YAML policy. Each identity gets its own counter, ensuring isolation between agents. This prevents a noisy neighbour from impacting other agents sharing the same Intercept proxy instance.

FREQUENTLY ASKED QUESTIONS

How does Intercept identify different users or agents?
Intercept uses the connection identity — typically derived from the client authentication or session context — to scope rate limits. Each distinct identity gets its own quota.
Can per-user limits differ between agents?
Yes. YAML policies can assign different rate limits to different identities or roles, giving higher quotas to trusted agents and lower quotas to less privileged ones.
What happens if an agent has no identity?
Anonymous or unidentified connections can be handled by a default policy — typically with stricter rate limits or outright denial, depending on the deployment's security requirements.

FURTHER READING

Enforce policies on every tool call

Intercept is the open-source MCP proxy that enforces YAML policies on AI agent tool calls. No code changes needed.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.