Skip to content

Verify Webhook Authenticity with HMAC

Configure HMAC signature verification on a webhook event source

Webhook event sources support HMAC-SHA256 signature verification. When a webhook secret is configured, Bifrost rejects any inbound request whose signature header doesn’t match a digest of the request body.

  1. Open the webhook event source and scroll to the Authentication section.

    HMAC Settings

  2. Set the shared Webhook Secret, the Signature Header name (e.g. X-Hub-Signature-256), and a Signature Prefix if your provider uses one (e.g. sha256=).

  3. Save. Subsequent inbound requests must carry a valid HMAC signature in the configured header, or they are rejected with 401.

FieldDescriptionExample
Webhook SecretShared secret used as the HMAC keywhsec_abc123...
Signature HeaderHeader carrying the signatureX-Hub-Signature-256
Signature PrefixStripped before comparisonsha256=
Event Type HeaderHeader carrying the event type (optional)X-Event-Type
Event Type FieldBody field carrying the event type (optional)event