Validate Seatable Webhooks with HMAC SHA256 Authentication

📌 Validate Seatable Webhooks with HMAC SHA256 Authentication

This mini workflow is designed to securely validate incoming Seatable webhooks using HMAC SHA256 signature verification.

🔐 What it does: Listens for incoming Seatable webhook requests. Calculates a SHA256 HMAC hash of the raw request body using your shared secret. Compares the computed hash with the x-seatable-signature header (after removing the sha256= prefix). If the hashes match: responds with 200 OK and forwards the request to subsequent nodes. If the hashes don’t match: responds with 403 Forbidden.

⚠️ Important Notes: This workflow is provided as a template and is not intended to work standalone. Please duplicate it and integrate it with your custom logic at the "Add nodes for processing" node.

Configuration steps: Set your secret key in the “Calculate sha256” crypto node (replace the placeholder). Adjust the webhook path to suit your environment (or set it to "manual" for testing). Connect your actual logic after the verification step.

0
Downloads
286
Views
8.84
Quality Score
beginner
Complexity
Author:Vitali(View Original →)
Created:8/14/2025
Updated:8/25/2025

🔒 Please log in to import templates to n8n and favorite templates

Workflow Visualization

Loading...

Preparing workflow renderer

Comments (0)

Login to post comments