How should the computation of the signature be done for client apps that receive Orchestrator requests and need to check their authenticity?

DRAG DROP

How should the computation of the signature be done for client apps that receive Orchestrator requests and need to check their authenticity?

Instructions: Drag the Description found on the left and drop on the correct Step Sequence found on the right.

Answer:

Explanation:

The correct sequence for the computation of the signature for client apps that receive Orchestrator requests and need to check their authenticity is:

Retrieve the X-UiPath-Signature HTTP header. This header contains the signature of the request body, encoded in Base64. (UiPath Orchestrator documentation1)

To obtain the raw signature bytes, decode the value of the header from Base64. You can use any tool or library that supports Base64 decoding. (UiPath Orchestrator documentation1)

Compute the hash using SHA256 and the signing key (UTF-8 encoded). The signing key is a secret value that is shared between Orchestrator and the client app. You can use any tool or library that supports SHA256 hashing. (UiPath Orchestrator documentation1)

Compare the computed signature to the value from X-UiPath-Signature HTTP header. If they match, then the request is authentic and has not been tampered with. If they do not match, then the request is invalid and should be rejected. (UiPath Orchestrator documentation1).

References:1: Webhooks – UiPath Orchestrator.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments