Validate Seatable Webhooks with HMAC SHA256 Authentication

Nodes

2cf69bf8-d025-41db-983e-898d5f3acf5a9dd572aa-e531-4ffe-a66c-58ac7003ac5d

Created by

ViVitali

Last edited 39 days ago

📌 Validate Seatable Webhooks with HMAC SHA256 Authentication

This mini workflow is designed to securely validate incoming Seatable webhooks using HMAC SHA256 signature verification.

🔐 What it does:

  • Listens for incoming Seatable webhook requests.
  • Calculates a SHA256 HMAC hash of the raw request body using your shared secret.
  • Compares the computed hash with the x-seatable-signature header (after removing the sha256= prefix).
  • If the hashes match: responds with 200 OK and forwards the request to subsequent nodes.
  • If the hashes don’t match: responds with 403 Forbidden.

⚠️ Important Notes:

This workflow is provided as a template and is not intended to work standalone. Please duplicate it and integrate it with your custom logic at the "Add nodes for processing" node.

Configuration steps:

  • Set your secret key in the “Calculate sha256” crypto node (replace the placeholder).
  • Adjust the webhook path to suit your environment (or set it to "manual" for testing).
  • Connect your actual logic after the verification step.

New to n8n?

Need help building new n8n workflows? Process automation for you or your company will save you time and money, and it's completely free!