Skip to content

Commit 5425741

Browse files
committed
small copy change
1 parent 5776b39 commit 5425741

File tree

12 files changed

+24
-216
lines changed

12 files changed

+24
-216
lines changed

v2/emailpassword/common-customizations/sessions/jwt-signing-key-rotation.mdx

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -121,15 +121,7 @@ func main() {
121121
```
122122

123123
:::caution
124-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
125-
126-
If `useDynamicAccessTokenSigningKey` is false:
127-
- `UPDATE session_info SET use_static_key = true;`
128-
129-
Else if `useDynamicAccessTokenSigningKey` is true:
130-
- `UPDATE session_info SET use_static_key = false;`
131-
132-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
124+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
133125
:::
134126

135127
</TabItem>
@@ -153,15 +145,7 @@ init(
153145
```
154146

155147
:::caution
156-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
157-
158-
If `useDynamicAccessTokenSigningKey` is false:
159-
- `UPDATE session_info SET use_static_key = true;`
160-
161-
Else if `useDynamicAccessTokenSigningKey` is true:
162-
- `UPDATE session_info SET use_static_key = false;`
163-
164-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
148+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
165149
:::
166150

167151

v2/emailpassword/common-customizations/sessions/with-jwt/jwt-verification.mdx

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -201,15 +201,7 @@ func main() {
201201
```
202202

203203
:::caution
204-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
205-
206-
If `useDynamicAccessTokenSigningKey` is false:
207-
- `UPDATE session_info SET use_static_key = true;`
208-
209-
Else if `useDynamicAccessTokenSigningKey` is true:
210-
- `UPDATE session_info SET use_static_key = false;`
211-
212-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
204+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
213205
:::
214206

215207
</TabItem>
@@ -233,15 +225,7 @@ init(
233225
```
234226

235227
:::caution
236-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
237-
238-
If `useDynamicAccessTokenSigningKey` is false:
239-
- `UPDATE session_info SET use_static_key = true;`
240-
241-
Else if `useDynamicAccessTokenSigningKey` is true:
242-
- `UPDATE session_info SET use_static_key = false;`
243-
244-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
228+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
245229
:::
246230

247231

v2/passwordless/common-customizations/sessions/jwt-signing-key-rotation.mdx

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -121,15 +121,7 @@ func main() {
121121
```
122122

123123
:::caution
124-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
125-
126-
If `useDynamicAccessTokenSigningKey` is false:
127-
- `UPDATE session_info SET use_static_key = true;`
128-
129-
Else if `useDynamicAccessTokenSigningKey` is true:
130-
- `UPDATE session_info SET use_static_key = false;`
131-
132-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
124+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
133125
:::
134126

135127
</TabItem>
@@ -153,15 +145,7 @@ init(
153145
```
154146

155147
:::caution
156-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
157-
158-
If `useDynamicAccessTokenSigningKey` is false:
159-
- `UPDATE session_info SET use_static_key = true;`
160-
161-
Else if `useDynamicAccessTokenSigningKey` is true:
162-
- `UPDATE session_info SET use_static_key = false;`
163-
164-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
148+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
165149
:::
166150

167151

v2/passwordless/common-customizations/sessions/with-jwt/jwt-verification.mdx

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -201,15 +201,7 @@ func main() {
201201
```
202202

203203
:::caution
204-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
205-
206-
If `useDynamicAccessTokenSigningKey` is false:
207-
- `UPDATE session_info SET use_static_key = true;`
208-
209-
Else if `useDynamicAccessTokenSigningKey` is true:
210-
- `UPDATE session_info SET use_static_key = false;`
211-
212-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
204+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
213205
:::
214206

215207
</TabItem>
@@ -233,15 +225,7 @@ init(
233225
```
234226

235227
:::caution
236-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
237-
238-
If `useDynamicAccessTokenSigningKey` is false:
239-
- `UPDATE session_info SET use_static_key = true;`
240-
241-
Else if `useDynamicAccessTokenSigningKey` is true:
242-
- `UPDATE session_info SET use_static_key = false;`
243-
244-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
228+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
245229
:::
246230

247231

v2/session/common-customizations/sessions/jwt-signing-key-rotation.mdx

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -121,15 +121,7 @@ func main() {
121121
```
122122

123123
:::caution
124-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
125-
126-
If `useDynamicAccessTokenSigningKey` is false:
127-
- `UPDATE session_info SET use_static_key = true;`
128-
129-
Else if `useDynamicAccessTokenSigningKey` is true:
130-
- `UPDATE session_info SET use_static_key = false;`
131-
132-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
124+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
133125
:::
134126

135127
</TabItem>
@@ -153,15 +145,7 @@ init(
153145
```
154146

155147
:::caution
156-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
157-
158-
If `useDynamicAccessTokenSigningKey` is false:
159-
- `UPDATE session_info SET use_static_key = true;`
160-
161-
Else if `useDynamicAccessTokenSigningKey` is true:
162-
- `UPDATE session_info SET use_static_key = false;`
163-
164-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
148+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
165149
:::
166150

167151

v2/session/common-customizations/sessions/with-jwt/jwt-verification.mdx

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -201,15 +201,7 @@ func main() {
201201
```
202202

203203
:::caution
204-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
205-
206-
If `useDynamicAccessTokenSigningKey` is false:
207-
- `UPDATE session_info SET use_static_key = true;`
208-
209-
Else if `useDynamicAccessTokenSigningKey` is true:
210-
- `UPDATE session_info SET use_static_key = false;`
211-
212-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
204+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
213205
:::
214206

215207
</TabItem>
@@ -233,15 +225,7 @@ init(
233225
```
234226

235227
:::caution
236-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
237-
238-
If `useDynamicAccessTokenSigningKey` is false:
239-
- `UPDATE session_info SET use_static_key = true;`
240-
241-
Else if `useDynamicAccessTokenSigningKey` is true:
242-
- `UPDATE session_info SET use_static_key = false;`
243-
244-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
228+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
245229
:::
246230

247231

v2/thirdparty/common-customizations/sessions/jwt-signing-key-rotation.mdx

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -121,15 +121,7 @@ func main() {
121121
```
122122

123123
:::caution
124-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
125-
126-
If `useDynamicAccessTokenSigningKey` is false:
127-
- `UPDATE session_info SET use_static_key = true;`
128-
129-
Else if `useDynamicAccessTokenSigningKey` is true:
130-
- `UPDATE session_info SET use_static_key = false;`
131-
132-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
124+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
133125
:::
134126

135127
</TabItem>
@@ -153,15 +145,7 @@ init(
153145
```
154146

155147
:::caution
156-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
157-
158-
If `useDynamicAccessTokenSigningKey` is false:
159-
- `UPDATE session_info SET use_static_key = true;`
160-
161-
Else if `useDynamicAccessTokenSigningKey` is true:
162-
- `UPDATE session_info SET use_static_key = false;`
163-
164-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
148+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
165149
:::
166150

167151

v2/thirdparty/common-customizations/sessions/with-jwt/jwt-verification.mdx

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -201,15 +201,7 @@ func main() {
201201
```
202202

203203
:::caution
204-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
205-
206-
If `useDynamicAccessTokenSigningKey` is false:
207-
- `UPDATE session_info SET use_static_key = true;`
208-
209-
Else if `useDynamicAccessTokenSigningKey` is true:
210-
- `UPDATE session_info SET use_static_key = false;`
211-
212-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
204+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
213205
:::
214206

215207
</TabItem>
@@ -233,15 +225,7 @@ init(
233225
```
234226

235227
:::caution
236-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
237-
238-
If `useDynamicAccessTokenSigningKey` is false:
239-
- `UPDATE session_info SET use_static_key = true;`
240-
241-
Else if `useDynamicAccessTokenSigningKey` is true:
242-
- `UPDATE session_info SET use_static_key = false;`
243-
244-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
228+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
245229
:::
246230

247231

v2/thirdpartyemailpassword/common-customizations/sessions/jwt-signing-key-rotation.mdx

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -121,15 +121,7 @@ func main() {
121121
```
122122

123123
:::caution
124-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
125-
126-
If `useDynamicAccessTokenSigningKey` is false:
127-
- `UPDATE session_info SET use_static_key = true;`
128-
129-
Else if `useDynamicAccessTokenSigningKey` is true:
130-
- `UPDATE session_info SET use_static_key = false;`
131-
132-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
124+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
133125
:::
134126

135127
</TabItem>
@@ -153,15 +145,7 @@ init(
153145
```
154146

155147
:::caution
156-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
157-
158-
If `useDynamicAccessTokenSigningKey` is false:
159-
- `UPDATE session_info SET use_static_key = true;`
160-
161-
Else if `useDynamicAccessTokenSigningKey` is true:
162-
- `UPDATE session_info SET use_static_key = false;`
163-
164-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
148+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
165149
:::
166150

167151

v2/thirdpartyemailpassword/common-customizations/sessions/with-jwt/jwt-verification.mdx

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -201,15 +201,7 @@ func main() {
201201
```
202202

203203
:::caution
204-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
205-
206-
If `useDynamicAccessTokenSigningKey` is false:
207-
- `UPDATE session_info SET use_static_key = true;`
208-
209-
Else if `useDynamicAccessTokenSigningKey` is true:
210-
- `UPDATE session_info SET use_static_key = false;`
211-
212-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
204+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
213205
:::
214206

215207
</TabItem>
@@ -233,15 +225,7 @@ init(
233225
```
234226

235227
:::caution
236-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
237-
238-
If `useDynamicAccessTokenSigningKey` is false:
239-
- `UPDATE session_info SET use_static_key = true;`
240-
241-
Else if `useDynamicAccessTokenSigningKey` is true:
242-
- `UPDATE session_info SET use_static_key = false;`
243-
244-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
228+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
245229
:::
246230

247231

0 commit comments

Comments
 (0)