Security
JWT Signature Configuration [Enterprise]
Protect your webhook and API integrations with JWT authentication. Asymmetric JWT signing gives you cryptographic proof that requests are genuine, helping keep out unauthorized access and block replay attacks.
Key Benefits:
- Zero-trust security: Eliminates shared secret vulnerabilities with public key verification - Automatic protection: Built-in token expiration and unique identifiers prevent replay attacks - Seamless rotation: Update keys without service disruption - Enterprise ready: Minimal configuration for maximum security
All outbound requests now include signed JWTs that you can verify using your public keys through our JWKS endpoint.
![JWT Signature Configuration [Enterprise] screenshot 1](/_next/image?url=https%3A%2F%2Fcdn.sanity.io%2Fimages%2Ftmmoa80b%2Fproduction%2Fc8e1a75d2bafaee1c9289c6ee068c0ea6b2a9ea8-1200x806.jpg&w=3840&q=75)