Authentication
To enhance security against potential attacks like spam and DDoS on your endpoint, we recommend implementing authentication for all incoming requests. For this purpose, we include a hash and timestamp in the headers of webhooks. The hash is generated using the SHA256 cryptographic algorithm, following the format:
api_secret
:
timestamp
,
where:
api_secret – is a secret key that you can get by sending us a request for it,
timestamp – is a UNIX timestamp in seconds.
Listing 3.1 – Example of auth hash calculating (pseudocode)
It is recommended to always authenticate all incoming webhooks.
Last updated