This command permanently deletes all security keys for the specified user. The user will need to re-register their security keys to use passkey authentication again.
Rotate the server secret by decrypting all encrypted values with the old secret and re-encrypting with a new secret. This command updates OIDC IdP configurations and license keys in the database, as well as the config file.
--old-secret (required): The current server secret (for verification)
--new-secret (required): The new server secret to use (must be at least 8 characters long)
--force (optional): Force rotation even if the old secret doesn’t match the config file. Use this if you know the old secret is correct but the config file is out of sync.
This command performs a critical operation that affects all encrypted data in your database. Ensure you have a backup before running this command.Important considerations:
The new secret must be at least 8 characters long
The new secret must be different from the old secret
The command verifies the old secret matches the config file (unless --force is used)
After rotation, you must restart the server for the new secret to take effect
Using --force with an incorrect old secret will cause the rotation to fail or corrupt encrypted data
--secret (optional): Server secret used to encrypt the CA private key. If omitted, the secret is read from the config file (config.yml or config.yaml in the config directory).
--force (optional, default: false): Overwrite existing CA keys for the organization if they already exist
If the organization already has CA keys, the command fails unless you pass --force. Using --force overwrites the existing keys; ensure you have a backup or understand the impact before overwriting.