FusionAuth has the following known limits.
Each account must have a user identifier, either an email address or a username. Users may not have multiple email addresses. See this issue for more information.
When using the Elasticsearch search engine, the maximum number of users returned for any search is 10,000 users. There is an open bug tracking this issue.
You can work around this limit by writing one or more search queries to return less than 10,000 users.
For example, if you needed to pull all of your users, you could query for users with an email address starting with
A, then starting with
B, and so on.
You can also run your query directly against Elasticsearch.
FusionAuth stores most data in a database. Lengths of specific fields are documented in the database schema for your database type. Please download the database schema for your version of FusionAuth to review length limits for a particular column.
Many varchar columns have a length of 191. Why 191? In MySQL when using a
utf8mb4 (4 byte character set) on an indexed column, MySQL limits the usable characters to 191 to account for the overhead of the 4 byte addressing. The InnoDB MySQL engine has a max index length of 767 bytes (for mysql 5.7.9, the earliest version of MySQL which Fusionauth supports). Because we are using
utf8mb4 which allows up to 4 bytes per character, we end up with 767/4 ~ 191, so we set the column length to that.
FusionAuth is API first and every entity can be managed by an API, with one exception: API keys cannot be created or managed via the API.
The only ways to create an API key are:
Use the administrative user interface
Kickstart which only works on fresh installations.
However, there is an open GitHub issue to create an API key management API.
Minimum Key Lengths
You can use FusionAuth to manage your keys. Due to security considerations, FusionAuth won’t import keys below a certain length.
For RSA keys, the minimum length is 2048.
For ECC keys, the minimum length is 256.
See the Keys API for more, including supported algorithms and lengths.
There are a number of default entities which cannot be removed. Additionally, there are limits to modifying these entities.
The Default tenant
The FusionAuth application, which resides in the Default tenant
The Default theme, which is read only
The FusionAuth application roles, which may be assigned to users, but are immutable
FusionAuth supports SAML both as an Identity Provider (IdP) and as a Service Provider (SP).
The IdP implementation has certain limitations. Version
2.0 is supported; other SAML versions are unsupported.
FusionAuth supports two
Please examine the
NameIDPolicy of the software package for which you are configuring FusionAuth as the IdP to determine if these
NameIDPolicy values are supported.
There is an open feature request to support
urn:oasis:names:tc:SAML:2.0:nameid-format:persistent but this
NameIDPolicy is currently unsupported.
FusionAuth supports the following SAMLv2 bindings:
Other bindings are not supported.
What’s Not Limited
All other entities, including but not limited to the following, are limited only by the resources of your system:
How helpful was this page?