Skip to content

Commit 19afb45

Browse files
committed
chore: format
1 parent 138b059 commit 19afb45

1 file changed

Lines changed: 16 additions & 9 deletions

File tree

docs/hydra/guides/oauth2-clients.mdx

Lines changed: 16 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -137,14 +137,14 @@ OAuth2 client secret rotation allows you to change a client's secret without dow
137137
remains valid until you explicitly clean it up, allowing you to update all services using the client credentials without service
138138
interruption.
139139

140-
### How secret rotation works
140+
##### How secret rotation works
141141

142142
1. Rotate the secret: Generate a new secret for the client
143143
2. Both secrets work: Old and new secrets both authenticate until cleanup
144144
3. Update services: Update your applications to use the new secret
145145
4. Cleanup: Manually remove old rotated secrets once all services are updated
146146

147-
### Rotate client secret
147+
##### Rotate client secret
148148

149149
To rotate an OAuth2 client secret, use the following methods:
150150

@@ -186,7 +186,7 @@ console.log("New secret:", client.client_secret)
186186
</Tabs>
187187
````
188188

189-
### Clear rotated secrets
189+
##### Clear rotated secrets
190190

191191
Once all services have been updated to use the new secret, you can remove the old rotated secrets to revoke access using the old
192192
credentials:
@@ -219,7 +219,7 @@ await ory.deleteRotatedOAuth2ClientSecrets({
219219
</Tabs>
220220
````
221221

222-
### Secret rotation workflow example
222+
##### Secret rotation workflow example
223223

224224
Here's a complete workflow for rotating a client secret:
225225

@@ -248,12 +248,19 @@ curl -X DELETE "https://{project.slug}.projects.oryapis.com/admin/clients/$CLIEN
248248
# Old secret is now revoked
249249
```
250250

251-
:::tip Zero-downtime credential rotation Secret rotation enables zero-downtime credential updates. Both the old and new secrets
252-
remain valid until you manually clean up the rotated secrets, allowing you to update all your services without service
253-
interruption. :::
251+
:::tip Zero-downtime credential rotation
254252

255-
:::warning Security best practice Rotated secrets remain valid indefinitely until you explicitly clean them up. Always remove old
256-
rotated secrets once your migration is complete to ensure that compromised credentials cannot be used. :::
253+
Secret rotation enables zero-downtime credential updates. Both the old and new secrets remain valid until you manually clean up
254+
the rotated secrets, allowing you to update all your services without service interruption.
255+
256+
:::
257+
258+
:::warning Security best practice
259+
260+
Rotated secrets remain valid indefinitely until you explicitly clean them up. Always remove old rotated secrets once your
261+
migration is complete to ensure that compromised credentials cannot be used.
262+
263+
:::
257264

258265
## Delete OAuth2 client
259266

0 commit comments

Comments
 (0)