Use when requests involve payment-like operations, write retries, duplicate submission handling, idempotency keys, safe retriable APIs, or protecting systems from repeated side effects. Design idempotent API operations and retry-safe clients: duplicate request handling, idempotency keys, conflict semantics, retry strategy, timeout recovery, and exactly-once illusions across distributed systems.