Skip to content

Commit bf00cdc

Browse files
docs: clarify single-instance vs dual-phase rotation per provider
- Add rotation behavior section to overview with provider comparison table - Add dual-phase callout to 12 provider docs (PostgreSQL, MySQL, MSSQL, etc.) - Update single-instance provider docs with warning callouts (Auth0, LDAP, Unix/Linux, Windows) - Add FAQ explaining rotation type differences Resolves SECRETS-99 Co-authored-by: Cursor <cursoragent@cursor.com>
1 parent 22ea87e commit bf00cdc

17 files changed

+132
-20
lines changed

docs/documentation/platform/secret-rotation/auth0-client-secret.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@ description: "Learn how to automatically rotate Auth0 Client Secrets."
44
---
55

66
<Note>
7-
Due to how Auth0 client secrets are rotated, retired credentials will not be able to
8-
authenticate with Auth0 during their [inactive period](./overview#how-rotation-works).
7+
**Rotation Type: [Single-Instance](/documentation/platform/secret-rotation/overview#single-instance-rotation)**
98

10-
This is a limitation of the Auth0 platform and cannot be
11-
rectified by Infisical.
9+
This rotation updates a single credential set in place. Old credentials become invalid immediately upon rotation.
10+
11+
This is a limitation of the Auth0 platform and cannot be rectified by Infisical.
1212
</Note>
1313

1414
## Prerequisites

docs/documentation/platform/secret-rotation/aws-iam-user-secret.mdx

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,12 @@ title: "AWS IAM User"
33
description: "Learn how to automatically rotate Access Key Id and Secret Key of AWS IAM Users."
44
---
55

6+
<Info>
7+
**Rotation Type: Dual-Phase**
8+
9+
This rotation maintains two active credential sets with overlapping validity, ensuring zero-downtime during rotation cycles.
10+
</Info>
11+
612
Infisical's AWS IAM User secret rotation capability lets you update the **Access key** and **Secret access key** credentials of a target IAM user from within Infisical
713
at a specified interval or on-demand.
814

docs/documentation/platform/secret-rotation/azure-client-secret.mdx

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,12 @@ title: "Azure Client Secret"
33
description: "Learn how to automatically rotate Azure Client Secrets."
44
---
55

6+
<Info>
7+
**Rotation Type: Dual-Phase**
8+
9+
This rotation maintains two active credential sets with overlapping validity, ensuring zero-downtime during rotation cycles.
10+
</Info>
11+
612
## Prerequisites
713

814
- Create an [Azure Client Secret Connection](/integrations/app-connections/azure-client-secrets).

docs/documentation/platform/secret-rotation/databricks-service-principal-secret.mdx

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,12 @@ title: "Databricks Service Principal Secret"
33
description: "Learn how to automatically rotate Databricks Service Principal OAuth Secrets."
44
---
55

6+
<Info>
7+
**Rotation Type: Dual-Phase**
8+
9+
This rotation maintains two active credential sets with overlapping validity, ensuring zero-downtime during rotation cycles.
10+
</Info>
11+
612
## Prerequisites
713

814
- Ensure you've configured the service principal for rotation. See [Configure Permissions for Secret Rotation](/integrations/app-connections/databricks#configure-permissions-for-secret-rotation).

docs/documentation/platform/secret-rotation/dbt-service-token.mdx

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,12 @@ title: "DBT Service Token"
33
description: "Learn how to automatically rotate DBT Service Tokens."
44
---
55

6+
<Info>
7+
**Rotation Type: Dual-Phase**
8+
9+
This rotation maintains two active credential sets with overlapping validity, ensuring zero-downtime during rotation cycles.
10+
</Info>
11+
612
## Prerequisites
713

814
- Create a [DBT Connection](/integrations/app-connections/dbt).

docs/documentation/platform/secret-rotation/ldap-password.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@ description: "Learn how to automatically rotate LDAP passwords."
44
---
55

66
<Note>
7-
Due to how LDAP passwords are rotated, retired credentials will not be able to
8-
authenticate with the LDAP provider during their [inactive period](./overview#how-rotation-works).
7+
**Rotation Type: [Single-Instance](/documentation/platform/secret-rotation/overview#single-instance-rotation)**
98

10-
This is a limitation of the LDAP provider and cannot be
11-
rectified by Infisical.
9+
This rotation updates a single credential set in place. Old credentials become invalid immediately upon rotation.
10+
11+
This is a limitation of the LDAP provider and cannot be rectified by Infisical.
1212
</Note>
1313

1414
## Prerequisites

docs/documentation/platform/secret-rotation/mongodb-credentials.mdx

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,12 @@ title: "MongoDB Credentials Rotation"
33
description: "Learn how to automatically rotate MongoDB credentials."
44
---
55

6+
<Info>
7+
**Rotation Type: Dual-Phase**
8+
9+
This rotation maintains two active credential sets with overlapping validity, ensuring zero-downtime during rotation cycles.
10+
</Info>
11+
612
## Prerequisites
713

814
1. Create a [MongoDB Connection](/integrations/app-connections/mongodb) with the required **Secret Rotation** permissions

docs/documentation/platform/secret-rotation/mssql-credentials.mdx

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,12 @@ title: "Microsoft SQL Server Credentials Rotation"
33
description: "Learn how to automatically rotate Microsoft SQL Server credentials."
44
---
55

6+
<Info>
7+
**Rotation Type: Dual-Phase**
8+
9+
This rotation maintains two active credential sets with overlapping validity, ensuring zero-downtime during rotation cycles.
10+
</Info>
11+
612
## Prerequisites
713

814
1. Create a [Microsoft SQL Server Connection](/integrations/app-connections/mssql) with the required **Secret Rotation** permissions

docs/documentation/platform/secret-rotation/mysql-credentials.mdx

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,12 @@ title: "MySQL Credentials Rotation"
33
description: "Learn how to automatically rotate MySQL credentials."
44
---
55

6+
<Info>
7+
**Rotation Type: Dual-Phase**
8+
9+
This rotation maintains two active credential sets with overlapping validity, ensuring zero-downtime during rotation cycles.
10+
</Info>
11+
612
## Prerequisites
713

814
1. Create a [MySQL Connection](/integrations/app-connections/mysql) with the required **Secret Rotation** permissions

docs/documentation/platform/secret-rotation/okta-client-secret.mdx

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,12 @@ title: "Okta Client Secret"
33
description: "Learn how to automatically rotate Okta Client Secrets."
44
---
55

6+
<Info>
7+
**Rotation Type: Dual-Phase**
8+
9+
This rotation maintains two active credential sets with overlapping validity, ensuring zero-downtime during rotation cycles.
10+
</Info>
11+
612
## Prerequisites
713

814
- Create an [Okta Connection](/integrations/app-connections/okta).

0 commit comments

Comments
 (0)