@@ -137,14 +137,14 @@ OAuth2 client secret rotation allows you to change a client's secret without dow
137137remains valid until you explicitly clean it up, allowing you to update all services using the client credentials without service
138138interruption.
139139
140- ### How secret rotation works
140+ ##### How secret rotation works
141141
1421421 . Rotate the secret: Generate a new secret for the client
1431432 . Both secrets work: Old and new secrets both authenticate until cleanup
1441443 . Update services: Update your applications to use the new secret
1451454 . Cleanup: Manually remove old rotated secrets once all services are updated
146146
147- ### Rotate client secret
147+ ##### Rotate client secret
148148
149149To rotate an OAuth2 client secret, use the following methods:
150150
@@ -186,7 +186,7 @@ console.log("New secret:", client.client_secret)
186186</Tabs>
187187````
188188
189- ### Clear rotated secrets
189+ ##### Clear rotated secrets
190190
191191Once all services have been updated to use the new secret, you can remove the old rotated secrets to revoke access using the old
192192credentials:
@@ -219,7 +219,7 @@ await ory.deleteRotatedOAuth2ClientSecrets({
219219</Tabs>
220220````
221221
222- ### Secret rotation workflow example
222+ ##### Secret rotation workflow example
223223
224224Here's a complete workflow for rotating a client secret:
225225
@@ -248,12 +248,19 @@ curl -X DELETE "https://{project.slug}.projects.oryapis.com/admin/clients/$CLIEN
248248# Old secret is now revoked
249249```
250250
251- :::tip Zero-downtime credential rotation Secret rotation enables zero-downtime credential updates. Both the old and new secrets
252- remain valid until you manually clean up the rotated secrets, allowing you to update all your services without service
253- interruption. :::
251+ :::tip Zero-downtime credential rotation
254252
255- :::warning Security best practice Rotated secrets remain valid indefinitely until you explicitly clean them up. Always remove old
256- rotated secrets once your migration is complete to ensure that compromised credentials cannot be used. :::
253+ Secret rotation enables zero-downtime credential updates. Both the old and new secrets remain valid until you manually clean up
254+ the rotated secrets, allowing you to update all your services without service interruption.
255+
256+ :::
257+
258+ :::warning Security best practice
259+
260+ Rotated secrets remain valid indefinitely until you explicitly clean them up. Always remove old rotated secrets once your
261+ migration is complete to ensure that compromised credentials cannot be used.
262+
263+ :::
257264
258265## Delete OAuth2 client
259266
0 commit comments