Skip to content

Commit 3491282

Browse files
committed
docs update
1 parent 908c7c4 commit 3491282

File tree

12 files changed

+156
-0
lines changed

12 files changed

+156
-0
lines changed

v2/emailpassword/common-customizations/sessions/jwt-signing-key-rotation.mdx

+13
Original file line numberDiff line numberDiff line change
@@ -137,4 +137,17 @@ init(
137137
</TabItem>
138138
</BackendSDKTabs>
139139

140+
:::caution
141+
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
142+
143+
If `useDynamicAccessTokenSigningKey` is false:
144+
- `UPDATE session_info SET use_static_key = true;`
145+
146+
Else if `useDynamicAccessTokenSigningKey` is true:
147+
- `UPDATE session_info SET use_static_key = false;`
148+
149+
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
150+
151+
:::
152+
140153
<!-- END COPY SECTION -->

v2/emailpassword/common-customizations/sessions/with-jwt/jwt-verification.mdx

+13
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,19 @@ init(
217217
</TabItem>
218218
</BackendSDKTabs>
219219

220+
:::caution
221+
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
222+
223+
If `useDynamicAccessTokenSigningKey` is false:
224+
- `UPDATE session_info SET use_static_key = true;`
225+
226+
Else if `useDynamicAccessTokenSigningKey` is true:
227+
- `UPDATE session_info SET use_static_key = false;`
228+
229+
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
230+
231+
:::
232+
220233
<!-- END COPY SECTION -->
221234

222235

v2/passwordless/common-customizations/sessions/jwt-signing-key-rotation.mdx

+13
Original file line numberDiff line numberDiff line change
@@ -137,4 +137,17 @@ init(
137137
</TabItem>
138138
</BackendSDKTabs>
139139

140+
:::caution
141+
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
142+
143+
If `useDynamicAccessTokenSigningKey` is false:
144+
- `UPDATE session_info SET use_static_key = true;`
145+
146+
Else if `useDynamicAccessTokenSigningKey` is true:
147+
- `UPDATE session_info SET use_static_key = false;`
148+
149+
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
150+
151+
:::
152+
140153
<!-- END COPY SECTION -->

v2/passwordless/common-customizations/sessions/with-jwt/jwt-verification.mdx

+13
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,19 @@ init(
217217
</TabItem>
218218
</BackendSDKTabs>
219219

220+
:::caution
221+
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
222+
223+
If `useDynamicAccessTokenSigningKey` is false:
224+
- `UPDATE session_info SET use_static_key = true;`
225+
226+
Else if `useDynamicAccessTokenSigningKey` is true:
227+
- `UPDATE session_info SET use_static_key = false;`
228+
229+
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
230+
231+
:::
232+
220233
<!-- END COPY SECTION -->
221234

222235

v2/session/common-customizations/sessions/jwt-signing-key-rotation.mdx

+13
Original file line numberDiff line numberDiff line change
@@ -137,4 +137,17 @@ init(
137137
</TabItem>
138138
</BackendSDKTabs>
139139

140+
:::caution
141+
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
142+
143+
If `useDynamicAccessTokenSigningKey` is false:
144+
- `UPDATE session_info SET use_static_key = true;`
145+
146+
Else if `useDynamicAccessTokenSigningKey` is true:
147+
- `UPDATE session_info SET use_static_key = false;`
148+
149+
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
150+
151+
:::
152+
140153
<!-- END COPY SECTION -->

v2/session/common-customizations/sessions/with-jwt/jwt-verification.mdx

+13
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,19 @@ init(
217217
</TabItem>
218218
</BackendSDKTabs>
219219

220+
:::caution
221+
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
222+
223+
If `useDynamicAccessTokenSigningKey` is false:
224+
- `UPDATE session_info SET use_static_key = true;`
225+
226+
Else if `useDynamicAccessTokenSigningKey` is true:
227+
- `UPDATE session_info SET use_static_key = false;`
228+
229+
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
230+
231+
:::
232+
220233
<!-- END COPY SECTION -->
221234

222235

v2/thirdparty/common-customizations/sessions/jwt-signing-key-rotation.mdx

+13
Original file line numberDiff line numberDiff line change
@@ -137,4 +137,17 @@ init(
137137
</TabItem>
138138
</BackendSDKTabs>
139139

140+
:::caution
141+
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
142+
143+
If `useDynamicAccessTokenSigningKey` is false:
144+
- `UPDATE session_info SET use_static_key = true;`
145+
146+
Else if `useDynamicAccessTokenSigningKey` is true:
147+
- `UPDATE session_info SET use_static_key = false;`
148+
149+
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
150+
151+
:::
152+
140153
<!-- END COPY SECTION -->

v2/thirdparty/common-customizations/sessions/with-jwt/jwt-verification.mdx

+13
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,19 @@ init(
217217
</TabItem>
218218
</BackendSDKTabs>
219219

220+
:::caution
221+
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
222+
223+
If `useDynamicAccessTokenSigningKey` is false:
224+
- `UPDATE session_info SET use_static_key = true;`
225+
226+
Else if `useDynamicAccessTokenSigningKey` is true:
227+
- `UPDATE session_info SET use_static_key = false;`
228+
229+
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
230+
231+
:::
232+
220233
<!-- END COPY SECTION -->
221234

222235

v2/thirdpartyemailpassword/common-customizations/sessions/jwt-signing-key-rotation.mdx

+13
Original file line numberDiff line numberDiff line change
@@ -137,4 +137,17 @@ init(
137137
</TabItem>
138138
</BackendSDKTabs>
139139

140+
:::caution
141+
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
142+
143+
If `useDynamicAccessTokenSigningKey` is false:
144+
- `UPDATE session_info SET use_static_key = true;`
145+
146+
Else if `useDynamicAccessTokenSigningKey` is true:
147+
- `UPDATE session_info SET use_static_key = false;`
148+
149+
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
150+
151+
:::
152+
140153
<!-- END COPY SECTION -->

v2/thirdpartyemailpassword/common-customizations/sessions/with-jwt/jwt-verification.mdx

+13
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,19 @@ init(
217217
</TabItem>
218218
</BackendSDKTabs>
219219

220+
:::caution
221+
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
222+
223+
If `useDynamicAccessTokenSigningKey` is false:
224+
- `UPDATE session_info SET use_static_key = true;`
225+
226+
Else if `useDynamicAccessTokenSigningKey` is true:
227+
- `UPDATE session_info SET use_static_key = false;`
228+
229+
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
230+
231+
:::
232+
220233
<!-- END COPY SECTION -->
221234

222235

v2/thirdpartypasswordless/common-customizations/sessions/jwt-signing-key-rotation.mdx

+13
Original file line numberDiff line numberDiff line change
@@ -137,4 +137,17 @@ init(
137137
</TabItem>
138138
</BackendSDKTabs>
139139

140+
:::caution
141+
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
142+
143+
If `useDynamicAccessTokenSigningKey` is false:
144+
- `UPDATE session_info SET use_static_key = true;`
145+
146+
Else if `useDynamicAccessTokenSigningKey` is true:
147+
- `UPDATE session_info SET use_static_key = false;`
148+
149+
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
150+
151+
:::
152+
140153
<!-- END COPY SECTION -->

v2/thirdpartypasswordless/common-customizations/sessions/with-jwt/jwt-verification.mdx

+13
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,19 @@ init(
217217
</TabItem>
218218
</BackendSDKTabs>
219219

220+
:::caution
221+
Once you make the change to this boolean, you will need to run the following query in your database for it to take affect for existing sessions (otherwise those users will be stuck in an infinite refresh loop):
222+
223+
If `useDynamicAccessTokenSigningKey` is false:
224+
- `UPDATE session_info SET use_static_key = true;`
225+
226+
Else if `useDynamicAccessTokenSigningKey` is true:
227+
- `UPDATE session_info SET use_static_key = false;`
228+
229+
If you are using the managed core, you can send an email to us about this, and we will run the query for you.
230+
231+
:::
232+
220233
<!-- END COPY SECTION -->
221234

222235

0 commit comments

Comments
 (0)