Updates an existing target’s configuration. The target will be activated with the new settings immediately after the update.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/zitadel/zitadel/llms.txt
Use this file to discover all available pages before exploring further.
HTTP Request
Permissions
Requiresaction.target.write permission.
Path Parameters
The unique identifier of the target to update (1-200 characters).
Request Body
Update the display name (1-1000 characters). If not set, name is unchanged.
Update the target type. Choose one:
POST request where only the status code is checked.
If true, execution stops on non-2xx response.
POST request where status code and body are checked.
If true, execution stops on non-2xx response.
Asynchronous POST request.
Update the timeout duration (e.g., ”10s”). Maximum is 270 seconds. If not set, timeout is unchanged.
Update the endpoint URL (1-2048 characters). If not set, endpoint is unchanged.
Regenerate the signing key. Set the graceful period for the existing key. Currently only immediate rotation (“0s”) is supported. Future versions will support longer expirations for smooth key transitions.
Update the payload type:
PAYLOAD_TYPE_JSON: JSON with X-ZITADEL-Signature headerPAYLOAD_TYPE_JWT: Signed JWTPAYLOAD_TYPE_JWE: Encrypted JWT
Response
When the target was updated.
New signing key (only returned if
expiration_signing_key was set in the request). The previous key is immediately invalidated.Example Request
Example Response
Error Responses
| Status Code | Description |
|---|---|
| 400 | Feature flag actions not enabled or invalid request |
| 401 | Unauthorized - missing or invalid authentication |
| 403 | Forbidden - insufficient permissions |
| 404 | Target not found |
Signing Key Rotation
When you rotate the signing key:- Set
expiration_signing_keyto “0s” (immediate rotation) - The new signing key is returned in the response
- The previous signing key is immediately invalidated
- Update your endpoint to use the new signing key for verification
Notes
- Changes take effect immediately
- Only specified fields are updated; others remain unchanged
- The target will be used with new settings in all executions
- If the target is actively used in executions, test the changes carefully
- Rotating the signing key invalidates the previous key immediately
- Future versions will support graceful key rotation with overlapping validity periods