Skip to content

Commit 352506e

Browse files
committed
Update readme: Mention CAB rule changes and its effect on server vs client side token generation.
1 parent 893257f commit 352506e

File tree

1 file changed

+13
-8
lines changed

1 file changed

+13
-8
lines changed

README.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -995,14 +995,19 @@ resources.
995995
There are two ways to generate downscoped tokens using a
996996
CredentialAccessBoundary:
997997

998-
* Server-side: Uses the `DownscopedCredentials` class. Each time a
999-
downscoped token is needed, the client makes a call to the Security Token Service (STS).
1000-
This is suitable for applications that require downscoped tokens infrequently, or applications that reuse a single downscoped credential many times.
1001-
* Client-side: Uses the `ClientSideCredentialAccessBoundaryFactory` class. This
1002-
approach minimizes calls to STS. The client retrieves necessary cryptographic
1003-
material once and then generates multiple downscoped tokens locally. This is
1004-
more efficient for applications that need to generate many unique downscoped tokens.
1005-
998+
* **Server-side (using `DownscopedCredentials`):** The client calls the Security
999+
Token Service (STS) each time a downscoped token is needed. This is suitable for
1000+
applications where the Credential Access Boundary rules change infrequently or
1001+
when a single downscoped credential is reused many times. A key consideration
1002+
is that every rule change requires a new call to the STS.
1003+
1004+
1005+
* **Client-side (using `ClientSideCredentialAccessBoundaryFactory`):** The client
1006+
retrieves cryptographic material once and then generates multiple downscoped
1007+
tokens locally. This minimizes calls to the STS and is more efficient when
1008+
Credential Access Boundary rules change frequently, as the client doesn't need
1009+
to contact the STS for each rule change. This is also more efficient for
1010+
applications that need to generate many *unique* downscoped tokens.
10061011
#### Server-side CAB
10071012

10081013
The `DownscopedCredentials` class can be used to produce a downscoped access

0 commit comments

Comments
 (0)