You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently we're generating a new pieriandx session token every five minutes (stored in AWS secrets manager) courtesy of the cttso-ica-to-pieriandx stack.
Comprises the following
Has two secrets - an API Key (just a username password combination updated every second month) and an access token (expires after 5 mins)
One lambda that has read access to the API Key and read/write access to the access token. Lambda determines if the access token is valid / not expired. If the access token is near expired (within 30 seconds), access token is regenerated and stored in AWS secretsmanager, the new access token is returned to the user.
One shell script to update the pieriandx username password combination.
The text was updated successfully, but these errors were encountered:
Thanks @victorskl, I'm using the icav2 credentials stack as my template here. Not as simple as the key rotation here since token expires every 30 minutes!
Problem
Currently we're generating a new pieriandx session token every five minutes (stored in AWS secrets manager) courtesy of the cttso-ica-to-pieriandx stack.
Comprises the following
The text was updated successfully, but these errors were encountered: