HomeGuidesAPI ReferenceGuidesMRT APIConfiguration API
GitHubAirheads Developer Community
Guides

Authentication

HPE Aruba Networking Central Webhooks provides multiple authentication methods to ensure secure communication between Central and your application. This includes authenticating your application to receive Webhook events and validating the authenticity and integrity of messages being sent from Central.

Authentication Methods

Central supports two primary authentication mechanisms for Webhook receivers:

API Key Authentication

API Key authentication allows your Webhook endpoint to authenticate incoming requests using a static API key. When creating a Webhook with API key authentication, you provide your application's secret key that Central will include in the request header or payload when sending events to your Webhook endpoint. To see an example of this refer to the Create ServiceNow Incidents from Central Webhooks workflow.

OIDC Authentication

OpenID Connect (OIDC) authentication provides OAuth 2.0-based authentication for your Webhook endpoint. When configuring OIDC authentication, you provide:

  • Target URL - The HTTP or HTTPS endpoint on the receiver’s server that listens for incoming Webhook requests
  • Client ID - Your application's client identifier
  • Client Secret - Your application's client secret

Central will obtain an access token from your OIDC provider and include it in Webhook requests to your endpoint.

Message Integrity Validation with HMAC

In addition to authenticating your application, Central provides Hash-based Message Authentication Code (HMAC) to validate the authenticity and integrity of Webhook messages. HMAC ensures that:

  • Messages are sent by HPE Aruba Networking Central (authenticity)
  • Messages have not been tampered with in transit (integrity)

How HMAC Works

HMAC uses a cryptographic hash function combined with a secret key to compute a message authentication code. To validate a Webhook message, you need:

  • Secret Key/Token - Generated by Central when creating the Webhook
  • Signature header - Contains the received Base64 signature value (for example: sig1=:...:)
  • Signature-Input header - Includes metadata that defines which request components were signed and how the signature was generated
  • Request values and headers referenced:
    • @method
    • @target-uri
    • @authority
    • @scheme
    • @path
    • date

Central computes an HMAC signature using the inputs and includes it in the Signature header. Your application should compute the same signature using the shared secret key. If the computed signature matches the Signature header, the message is authentic and unmodified.

Obtaining the HMAC Secret Key

Web UI

Upon Creating a Webhook users will be presented with the HMAC secret key.

REST API

Similar to creating a Webhook through the UI, when you create a Webhook through Central's API the response returned will contain the HMAC Secret Key:

Rotating the HMAC Secret Key

For enhanced security, you can rotate (regenerate) the HMAC secret key periodically.

Web UI

Once the Webhook is created, users can regenerate the key by returning to the Webhooks table under API Gateway and selecting the ellipses on the right hand side and choosing to "Regenerate Token".

REST API

API Endpoint: /network-services/v1/webhooks/{id}/rotate-hmac-key
API Method: POST

Response: The API will return the new HMAC secret token. Update your application with the new token to continue validating Webhook messages.