Authorizations
The signature header follows the format t={timestamp},v1={signature}
.
Verification steps:
- Extract the timestamp and signature from the signature header
- Reject the request if the timestamp is older than 5 minutes
- Recreate the signed payload: '{timestamp}.{raw_request_body}'
- Compute HMAC-SHA256 of the signed payload using your webhook secret as the key
- Compare the computed signature with the one in the header
Body
application/json
Unique identifier for this webhook event
Example:
"123e4567-e89b-12d3-a456-426614174000"
ID of the webhook subscription that received the event
Example:
"123e4567-e89b-12d3-a456-426614174000"
ID of the organization that owns the bank account
Example:
"123e4567-e89b-12d3-a456-426614174000"
ID of the membership associated with subscription
Example:
"123e4567-e89b-12d3-a456-426614174000"
Available options:
v1/transactions
, v1/accounts
, v1/organizations
, v1/memberships
, v1/consent-revocations
, v1/cards
Example:
"v1/transactions"
Timestamp when the webhook event was created
Example:
"2025-01-24T10:55:00Z"
Response
200
Webhook received successfully