Quantcast
Channel: Bountied questions - Information Security Stack Exchange
Viewing all articles
Browse latest Browse all 154

Why are HMAC signatures frequently used for webhook authorization but not other HTTP API requests?

$
0
0

HMAC signatures are very commonly used for webhook authorization from service to consumer.

Examples:

and hundreds and hundreds more. This seems a near universal design decision.

Yet, the other direction (consumer to service) never uses HMAC signatures. The mechanism varies, but in some cases secrets are put directly in headers.

Why is HMAC so strongly preferred for service to consumer HTTP messages, but not consumer to service?


Viewing all articles
Browse latest Browse all 154

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>