You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: v2/emailpassword/common-customizations/sessions/jwt-signing-key-rotation.mdx
+2-18Lines changed: 2 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -121,15 +121,7 @@ func main() {
121
121
```
122
122
123
123
:::caution
124
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
125
-
126
-
If `useDynamicAccessTokenSigningKey` is false:
127
-
-`UPDATE session_info SET use_static_key = true;`
128
-
129
-
Else if `useDynamicAccessTokenSigningKey` is true:
130
-
-`UPDATE session_info SET use_static_key = false;`
131
-
132
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
124
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
133
125
:::
134
126
135
127
</TabItem>
@@ -153,15 +145,7 @@ init(
153
145
```
154
146
155
147
:::caution
156
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
157
-
158
-
If `useDynamicAccessTokenSigningKey` is false:
159
-
-`UPDATE session_info SET use_static_key = true;`
160
-
161
-
Else if `useDynamicAccessTokenSigningKey` is true:
162
-
-`UPDATE session_info SET use_static_key = false;`
163
-
164
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
148
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
Copy file name to clipboardExpand all lines: v2/emailpassword/common-customizations/sessions/with-jwt/jwt-verification.mdx
+2-18Lines changed: 2 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -201,15 +201,7 @@ func main() {
201
201
```
202
202
203
203
:::caution
204
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
205
-
206
-
If `useDynamicAccessTokenSigningKey` is false:
207
-
-`UPDATE session_info SET use_static_key = true;`
208
-
209
-
Else if `useDynamicAccessTokenSigningKey` is true:
210
-
-`UPDATE session_info SET use_static_key = false;`
211
-
212
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
204
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
213
205
:::
214
206
215
207
</TabItem>
@@ -233,15 +225,7 @@ init(
233
225
```
234
226
235
227
:::caution
236
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
237
-
238
-
If `useDynamicAccessTokenSigningKey` is false:
239
-
-`UPDATE session_info SET use_static_key = true;`
240
-
241
-
Else if `useDynamicAccessTokenSigningKey` is true:
242
-
-`UPDATE session_info SET use_static_key = false;`
243
-
244
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
228
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
Copy file name to clipboardExpand all lines: v2/passwordless/common-customizations/sessions/jwt-signing-key-rotation.mdx
+2-18Lines changed: 2 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -121,15 +121,7 @@ func main() {
121
121
```
122
122
123
123
:::caution
124
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
125
-
126
-
If `useDynamicAccessTokenSigningKey` is false:
127
-
-`UPDATE session_info SET use_static_key = true;`
128
-
129
-
Else if `useDynamicAccessTokenSigningKey` is true:
130
-
-`UPDATE session_info SET use_static_key = false;`
131
-
132
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
124
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
133
125
:::
134
126
135
127
</TabItem>
@@ -153,15 +145,7 @@ init(
153
145
```
154
146
155
147
:::caution
156
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
157
-
158
-
If `useDynamicAccessTokenSigningKey` is false:
159
-
-`UPDATE session_info SET use_static_key = true;`
160
-
161
-
Else if `useDynamicAccessTokenSigningKey` is true:
162
-
-`UPDATE session_info SET use_static_key = false;`
163
-
164
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
148
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
Copy file name to clipboardExpand all lines: v2/passwordless/common-customizations/sessions/with-jwt/jwt-verification.mdx
+2-18Lines changed: 2 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -201,15 +201,7 @@ func main() {
201
201
```
202
202
203
203
:::caution
204
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
205
-
206
-
If `useDynamicAccessTokenSigningKey` is false:
207
-
-`UPDATE session_info SET use_static_key = true;`
208
-
209
-
Else if `useDynamicAccessTokenSigningKey` is true:
210
-
-`UPDATE session_info SET use_static_key = false;`
211
-
212
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
204
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
213
205
:::
214
206
215
207
</TabItem>
@@ -233,15 +225,7 @@ init(
233
225
```
234
226
235
227
:::caution
236
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
237
-
238
-
If `useDynamicAccessTokenSigningKey` is false:
239
-
-`UPDATE session_info SET use_static_key = true;`
240
-
241
-
Else if `useDynamicAccessTokenSigningKey` is true:
242
-
-`UPDATE session_info SET use_static_key = false;`
243
-
244
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
228
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
Copy file name to clipboardExpand all lines: v2/session/common-customizations/sessions/jwt-signing-key-rotation.mdx
+2-18Lines changed: 2 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -121,15 +121,7 @@ func main() {
121
121
```
122
122
123
123
:::caution
124
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
125
-
126
-
If `useDynamicAccessTokenSigningKey` is false:
127
-
-`UPDATE session_info SET use_static_key = true;`
128
-
129
-
Else if `useDynamicAccessTokenSigningKey` is true:
130
-
-`UPDATE session_info SET use_static_key = false;`
131
-
132
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
124
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
133
125
:::
134
126
135
127
</TabItem>
@@ -153,15 +145,7 @@ init(
153
145
```
154
146
155
147
:::caution
156
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
157
-
158
-
If `useDynamicAccessTokenSigningKey` is false:
159
-
-`UPDATE session_info SET use_static_key = true;`
160
-
161
-
Else if `useDynamicAccessTokenSigningKey` is true:
162
-
-`UPDATE session_info SET use_static_key = false;`
163
-
164
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
148
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
Copy file name to clipboardExpand all lines: v2/session/common-customizations/sessions/with-jwt/jwt-verification.mdx
+2-18Lines changed: 2 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -201,15 +201,7 @@ func main() {
201
201
```
202
202
203
203
:::caution
204
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
205
-
206
-
If `useDynamicAccessTokenSigningKey` is false:
207
-
-`UPDATE session_info SET use_static_key = true;`
208
-
209
-
Else if `useDynamicAccessTokenSigningKey` is true:
210
-
-`UPDATE session_info SET use_static_key = false;`
211
-
212
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
204
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
213
205
:::
214
206
215
207
</TabItem>
@@ -233,15 +225,7 @@ init(
233
225
```
234
226
235
227
:::caution
236
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
237
-
238
-
If `useDynamicAccessTokenSigningKey` is false:
239
-
-`UPDATE session_info SET use_static_key = true;`
240
-
241
-
Else if `useDynamicAccessTokenSigningKey` is true:
242
-
-`UPDATE session_info SET use_static_key = false;`
243
-
244
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
228
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
Copy file name to clipboardExpand all lines: v2/thirdparty/common-customizations/sessions/jwt-signing-key-rotation.mdx
+2-18Lines changed: 2 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -121,15 +121,7 @@ func main() {
121
121
```
122
122
123
123
:::caution
124
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
125
-
126
-
If `useDynamicAccessTokenSigningKey` is false:
127
-
-`UPDATE session_info SET use_static_key = true;`
128
-
129
-
Else if `useDynamicAccessTokenSigningKey` is true:
130
-
-`UPDATE session_info SET use_static_key = false;`
131
-
132
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
124
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
133
125
:::
134
126
135
127
</TabItem>
@@ -153,15 +145,7 @@ init(
153
145
```
154
146
155
147
:::caution
156
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
157
-
158
-
If `useDynamicAccessTokenSigningKey` is false:
159
-
-`UPDATE session_info SET use_static_key = true;`
160
-
161
-
Else if `useDynamicAccessTokenSigningKey` is true:
162
-
-`UPDATE session_info SET use_static_key = false;`
163
-
164
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
148
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
Copy file name to clipboardExpand all lines: v2/thirdparty/common-customizations/sessions/with-jwt/jwt-verification.mdx
+2-18Lines changed: 2 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -201,15 +201,7 @@ func main() {
201
201
```
202
202
203
203
:::caution
204
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
205
-
206
-
If `useDynamicAccessTokenSigningKey` is false:
207
-
-`UPDATE session_info SET use_static_key = true;`
208
-
209
-
Else if `useDynamicAccessTokenSigningKey` is true:
210
-
-`UPDATE session_info SET use_static_key = false;`
211
-
212
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
204
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
213
205
:::
214
206
215
207
</TabItem>
@@ -233,15 +225,7 @@ init(
233
225
```
234
226
235
227
:::caution
236
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
237
-
238
-
If `useDynamicAccessTokenSigningKey` is false:
239
-
-`UPDATE session_info SET use_static_key = true;`
240
-
241
-
Else if `useDynamicAccessTokenSigningKey` is true:
242
-
-`UPDATE session_info SET use_static_key = false;`
243
-
244
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
228
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
Copy file name to clipboardExpand all lines: v2/thirdpartyemailpassword/common-customizations/sessions/jwt-signing-key-rotation.mdx
+2-18Lines changed: 2 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -121,15 +121,7 @@ func main() {
121
121
```
122
122
123
123
:::caution
124
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
125
-
126
-
If `useDynamicAccessTokenSigningKey` is false:
127
-
-`UPDATE session_info SET use_static_key = true;`
128
-
129
-
Else if `useDynamicAccessTokenSigningKey` is true:
130
-
-`UPDATE session_info SET use_static_key = false;`
131
-
132
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
124
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
133
125
:::
134
126
135
127
</TabItem>
@@ -153,15 +145,7 @@ init(
153
145
```
154
146
155
147
:::caution
156
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
157
-
158
-
If `useDynamicAccessTokenSigningKey` is false:
159
-
-`UPDATE session_info SET use_static_key = true;`
160
-
161
-
Else if `useDynamicAccessTokenSigningKey` is true:
162
-
-`UPDATE session_info SET use_static_key = false;`
163
-
164
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
148
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
Copy file name to clipboardExpand all lines: v2/thirdpartyemailpassword/common-customizations/sessions/with-jwt/jwt-verification.mdx
+2-18Lines changed: 2 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -201,15 +201,7 @@ func main() {
201
201
```
202
202
203
203
:::caution
204
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
205
-
206
-
If `useDynamicAccessTokenSigningKey` is false:
207
-
-`UPDATE session_info SET use_static_key = true;`
208
-
209
-
Else if `useDynamicAccessTokenSigningKey` is true:
210
-
-`UPDATE session_info SET use_static_key = false;`
211
-
212
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
204
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
213
205
:::
214
206
215
207
</TabItem>
@@ -233,15 +225,7 @@ init(
233
225
```
234
226
235
227
:::caution
236
-
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
237
-
238
-
If `useDynamicAccessTokenSigningKey` is false:
239
-
-`UPDATE session_info SET use_static_key = true;`
240
-
241
-
Else if `useDynamicAccessTokenSigningKey` is true:
242
-
-`UPDATE session_info SET use_static_key = false;`
243
-
244
-
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
228
+
Updating this value will cause a spike in the session refresh API, as and when users visit your application.
0 commit comments