Hi Eric,

In Monasca use cases sending the token in the request header should be enough, 
I guess. I'm adding the references to the HipChat [1] and Slack APIs [2] as 
well as two old blueprints [3, 4].

[1] https://developer.atlassian.com/server/hipchat/about-the-hipchat-rest-api/
[2] https://api.slack.com/web#authentication
[3] https://blueprints.launchpad.net/monasca/+spec/webhook-api-support
[4] https://blueprints.launchpad.net/monasca/+spec/secure-notification-params

Greetings
Witek

P.S. Adding Vitrage to the tags list.


> -----Original Message-----
> From: Eric K <ekcs.openst...@gmail.com>
> Sent: Donnerstag, 3. Mai 2018 21:50
> To: OpenStack Development Mailing List (not for usage questions)
> <openstack-dev@lists.openstack.org>
> Subject: [openstack-dev] [keystone][monasca][congress][senlin][telemetry]
> authenticated webhook notifications
> 
> Question to the projects which send or consume webhook notifications
> (telemetry, monasca, senlin, vitrage, etc.), what are your
> supported/preferred authentication mechanisms? Bearer token (e.g.
> Keystone)? Signing?
> 
> Any pointers to past discussions on the topic? My interest here is having
> Congress consume and send webhook notifications.
> 
> I know some people are working on adding the keystone auth option to
> Monasca's webhook framework. If there is a project that already does it, it
> could be a very helpful reference.
__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to