@@ -995,14 +995,19 @@ resources.
995995There are two ways to generate downscoped tokens using a
996996CredentialAccessBoundary:
997997
998- * Server-side: Uses the ` DownscopedCredentials ` class. Each time a
999- downscoped token is needed, the client makes a call to the Security Token Service (STS).
1000- This is suitable for applications that require downscoped tokens infrequently, or applications that reuse a single downscoped credential many times.
1001- * Client-side: Uses the ` ClientSideCredentialAccessBoundaryFactory ` class. This
1002- approach minimizes calls to STS. The client retrieves necessary cryptographic
1003- material once and then generates multiple downscoped tokens locally. This is
1004- more efficient for applications that need to generate many unique downscoped tokens.
1005-
998+ * ** Server-side (using ` DownscopedCredentials ` ):** The client calls the Security
999+ Token Service (STS) each time a downscoped token is needed. This is suitable for
1000+ applications where the Credential Access Boundary rules change infrequently or
1001+ when a single downscoped credential is reused many times. A key consideration
1002+ is that every rule change requires a new call to the STS.
1003+
1004+
1005+ * ** Client-side (using ` ClientSideCredentialAccessBoundaryFactory ` ):** The client
1006+ retrieves cryptographic material once and then generates multiple downscoped
1007+ tokens locally. This minimizes calls to the STS and is more efficient when
1008+ Credential Access Boundary rules change frequently, as the client doesn't need
1009+ to contact the STS for each rule change. This is also more efficient for
1010+ applications that need to generate many * unique* downscoped tokens.
10061011#### Server-side CAB
10071012
10081013The ` DownscopedCredentials ` class can be used to produce a downscoped access
0 commit comments