Forum Discussion
jhupka
Neophyte
2 months agoMy philosophy has been "If I can do it with a bearer token, then I will use that" because I have found the LMv1 security model to be effective, but fragile, to work with because of how the auth tokens are created.
For a thing like a log ingestion API depending on a bearer token, just create your own bearer-token-rotation policy.