Validate Seatable webhooks with HMAC SHA256 authentication
$20/month : Unlimited workflows
2500 executions/month
THE #1 IN WEB SCRAPING
Scrape any website without limits
HOSTINGER 🎉 Early Black Friday Deal
DISCOUNT 20% Try free
DISCOUNT 20%
Self-hosted n8n
Unlimited workflows - from $4.99/mo
#1 hub for scraping, AI & automation
6000+ actors - $5 credits/mo
📌 Validate Seatable Webhooks with HMAC SHA256 Authentication
This mini workflow is designed to securely validate incoming Seatable webhooks using HMAC SHA256 signature verification.
🔐 What it does:
- Listens for incoming Seatable webhook requests.
- Calculates a SHA256 HMAC hash of the raw request body using your shared secret.
- Compares the computed hash with the
x-seatable-signatureheader (after removing thesha256=prefix). - If the hashes match: responds with 200 OK and forwards the request to subsequent nodes.
- If the hashes don’t match: responds with 403 Forbidden.
⚠️ Important Notes:
This workflow is provided as a template and is not intended to work standalone. Please duplicate it and integrate it with your custom logic at the "Add nodes for processing" node.
Configuration steps:
- Set your secret key in the “Calculate sha256” crypto node (replace the placeholder).
- Adjust the webhook path to suit your environment (or set it to "manual" for testing).
- Connect your actual logic after the verification step.