Secret Keys introduction
This group of endpoints allows you to manage and rotate secret keys. Use it especially if your secret key security has been compromised or for regular security rotation. You will have exactly one, main, secret key with no expiry date and up to five time-limited keys.
You can either replace the main secret key or rotate with additional time-limited secret keys for gradual switch without downtime. If the migration takes longer than usual, you can update the expiration time, or delete the already unused secret key.
Note: You must be on a paid plan to use secret key rotation with the overlap period.