@@ -70,9 +70,9 @@ If your organization requires mutual authentication and stronger cryptographic g
7070For most organizations, use the following defaults:
7171
7272- Create one Service Account per service or worker deployment, not one shared Service Account for an entire team
73- - Scope credentials to the smallest practical set of Namespaces
7473- Use account-level Service Accounts only when a service genuinely needs cross-Namespace or account-wide access
7574- Prefer Namespace-scoped Service Accounts when a service should only access one Namespace
75+ - Grant Service Accounts namespace-level access only to the specific Namespaces they need
7676
7777This approach gives you cleaner ownership, easier rotation, and better auditability than sharing a single machine
7878identity across multiple services.
@@ -93,11 +93,11 @@ For more on topology tradeoffs, see [Namespace best practices](/best-practices/m
9393
9494### Rotate credentials without downtime
9595
96- Use the following sequence for both API keys and client certificates :
96+ Use the following sequence when rotating credentials :
9797
98981 . Create the replacement credential before the existing one expires.
99- 2 . Configure your secret store or deployment system so both old and new credentials can be used during the transition .
100- 3 . Roll your Workers and clients to load the new credential .
99+ 2 . For API keys, create the new valid key while the old key still works, then roll your Workers and clients to use the new key .
100+ 3 . For client certificates, stage the new certificate before removing the old one when your deployment process supports that transition .
1011014 . Validate connectivity and normal Workflow execution using the new credential.
1021025 . Remove the old credential only after all clients and Workers have switched.
103103
0 commit comments