Back to Guides
Webhooks & Automation6 min

Authentication

Secure your webhook connections with the right authentication method. Learn when to use Basic, Bearer, API Key, or no authentication for your webhook endpoints.

What you'll learn

  • No authentication
  • Basic authentication
  • Bearer token
  • API key
  • Security best practices
1

No authentication

The simplest option โ€” no credentials are sent with the webhook request. This works because platforms like Zapier, Make, and n8n use unique, randomly generated URLs that act as the secret. Only someone who knows the exact URL can send data to the endpoint. When to use: Zapier catch hooks (the URL contains your unique hook ID), Make custom webhooks (the URL contains your webhook ID), n8n webhook nodes (the URL contains a unique path). These platforms verify requests based on the URL alone. No authorization header is added to the request. This is the default for all platform templates in Chattlebot.

No Authentication

Simplest

The URL itself acts as the secret. Only people who know the unique URL can send data to the endpoint.

Common platforms:

Zapier

hooks.zapier.com/hooks/catch/...

Make

hook.make.com/...

n8n

your-n8n.example.com/webhook/...

Authorization header: None sent

No Authentication selected in the auth dropdown
2

Basic authentication

Basic authentication sends a username and password with every request, encoded as Base64 in the Authorization header. The format is 'Authorization: Basic {base64(username:password)}'. When Chattlebot sends the webhook, it automatically combines your username and password, encodes them, and adds the header โ€” you just enter the credentials in the form. When to use: legacy APIs that require HTTP Basic Auth, internal services with simple username/password protection, older CRM or database APIs. Basic auth is simple but sends credentials with every request, so always use it over HTTPS to prevent interception.

Basic Auth with username and password fields
3

Bearer token

Bearer token authentication sends a token in the Authorization header as 'Authorization: Bearer {your_token}'. This is the most common authentication method for modern APIs. The token is typically an OAuth2 access token, a JWT (JSON Web Token), or an API-generated token from the service youre connecting to. When to use: OAuth2 APIs (after obtaining an access token), JWT-based services, modern API platforms (Stripe, Twilio, SendGrid, etc.), any API documentation that says 'include your token in the Authorization header'. Enter your token in the Token field โ€” Chattlebot handles adding the 'Bearer' prefix and Authorization header automatically.

Bearer Token authentication with token field
4

API key

API Key authentication sends your key in a custom header. Unlike Bearer tokens which always use the Authorization header, API keys can use any header name the API requires. You specify both the header name (e.g., 'X-API-Key', 'X-Auth-Token', 'Api-Key') and the key value. When to use: APIs that require a specific custom header for authentication, services that issue API keys (as opposed to OAuth tokens), platforms that document authentication as 'include your API key in the X-API-Key header'. Common header name patterns include X-API-Key, X-Auth-Token, X-Access-Key, and Api-Key. Check your API's documentation for the exact header name expected.

API Key authentication with header name and key fields
5

Security best practices

Keeping your webhook connections secure is essential. All credentials in Chattlebot โ€” passwords, tokens, and API keys โ€” are encrypted at rest using industry-standard encryption. They are never stored in plain text and never exposed in logs or error messages. Beyond Chattlebot's built-in protections, follow these practices: Never share webhook URLs that contain secrets in the query string. If a URL includes an API key or token as a parameter, treat it like a password. Rotate tokens periodically โ€” set a calendar reminder to update Bearer tokens and API keys on a regular schedule (e.g., every 90 days). Use HTTPS only โ€” never configure a webhook URL with 'http://' (without the 's'). Plain HTTP sends your credentials and data unencrypted over the network. If you suspect a token has been compromised, rotate it immediately in your API provider's dashboard and update the credential in Chattlebot.

Security Best Practices

Encrypted at rest

All credentials are encrypted before storage

Never share webhook URLs

Treat URLs with secrets as passwords

Rotate tokens periodically

Update credentials on a regular schedule

Use HTTPS only

Never send credentials over plain HTTP

Important: If a token is compromised, rotate it immediately in your API provider and update the webhook in Chattlebot.

๐Ÿ’กPro Tip

  • If your API supports it, use IP allowlisting as an additional security layer. Restrict your API endpoint to accept requests only from known IP ranges.

Related Guides

Ready to get started?

Create your free account and start building your chatbot today.

Start Free Trial