# How to validate Webhooks?

When your webhook `secret` is set, Conscent uses it to create a hash signature with each payload. This hash signature is passed with each request under the `X-Conscent-Signature` header that you need to validate at your end.

{% tabs %}
{% tab title="Nodejs" %}

```javascript
var crypto = require('crypto');

var hmac = crypto.createHmac('sha256', '<WEBHOOK_SECRET>');

//passing the data to be hashed
rawBody = '<RAW_BODY_OF_REQUEST>';
signature = hmac.update(req.body).digest('hex');

//Printing the output on the console
console.log('hmac : ' + signature);

// NOTE: try matching `signature` with request header `x-conscent-signature`
```

{% endtab %}
{% endtabs %}

> ```
> Do Not Parse or Cast the Webhook Request Body
>
> While generating the signature at your end, ensure that the webhook body passed as an argument is the raw webhook request body. Do not parse or cast the webhook request body.
> ```
