Rotating your client secret

Edited

Overview

The Secret Rotation feature in Next Identity helps protect your client from unauthorized access by allowing you to generate a new client secret and phase out the old one. This reduces the risk of compromised credentials and supports best practices in application security.

You can rotate secrets manually in the Next Identity Console, confirm successful rotation, and view a history of all past rotations.

Prerequisites

  • Role-based permissions to manage secrets (see Roles and Permissions)

  • Coordination with your engineering team to ensure the new secret is updated in your systems before the old one expires

Steps

1. Access the Secret Rotation Component

  • Go to Clients

  • Select the client whose secret you want to rotate

  • Navigate to the Environment tab

  • Under Configure your client, select the Security tab and locate the Secret rotation section

2. Initiate the Rotation

  • Review the current secret and the last rotation date

  • Click Rotate to start the rotation process

3. Confirm the Environment

  • A confirmation dialog will appear

  • Ensure the correct environment is selected

4. Choose the Transition Period

  • Set the duration for how long the old secret remains valid

  • Options range from 0 hours (immediate deactivation) to 168 hours (7 days)

5. Confirm Rotation

  • Enter the client name to confirm the action

  • A new secret is generated and shown under the Credentials tab (initially obfuscated)

  • Toggle visibility using the eye icon

  • A message indicates when the old secret will expire

What Happens Next

  • Your old secret remains valid during the defined transition period

  • Update your backend services or API integrations with the new secret before the old one expires

  • You can monitor the status and see the rotation reflected in the Secret Rotation History

Viewing the Secret Rotation History

1. Navigate to the History Table

  • Go to Clients

  • Select the relevant client

  • In the Environment tab, access Configure your client > Security > Secret rotation

2. Review the History

If previous rotations exist, you'll see a history table showing:

  • Secret (hidden by default; toggle to reveal)

  • Initiated by (user who performed the rotation)

  • Rotation date and expiration date

  • Available actions (such as copy or revoke, if applicable)

The table is sorted by most recent by default.

Roles & Permissions

Only users with specific roles can view or initiate secret rotations.
To configure access, refer to the Roles and Permissions documentation or speak with your Next Identity Consultant.

Frequently Asked Questions (FAQs)

Q: Why should I always use the Next Identity Console for secret rotations?
A: It ensures your rotation process is secure, auditable, and integrated with the platform's secret lifecycle management.

Q: How often should I rotate my secrets?
A: Every 90 days is a common best practice, but consult your security team for compliance-specific requirements.

Q: What happens to the old secret?
A: It remains valid during the transition period (0–168 hours) and is invalidated automatically after expiration.

Q: How do I verify that rotation was successful?
A: A new secret appears in the Console, and the Secret Rotation History will show the rotation date and initiator.

Q: Can I view previous secrets?
A: Yes, depending on your role. The history table includes obfuscated entries and key rotation metadata.

Q: Who is authorized to rotate secrets?
A: Only users with the appropriate permissions. Check with your admin or Next Identity Consultant for role setup.

Was this article helpful?

Sorry about that! Care to tell us more?

Thanks for the feedback!

There was an issue submitting your feedback
Please check your connection and try again.