Skip to main content

Details

Creating Webhook

To create a new webhook call:

List all webhooks

To list all webhooks call:

Delete webhook

To delete webhook call:

Securing webhook

Check the webhook signature

To verify the webhook signature you will need to handle verification on your side. Fastauth is sending two headers:

  • x-fastauth-signature-256
  • x-fastauth-api-signature-256

Each of them contains two parameters:

  • t - timestamp when the request was sent from FastAuth
  • sha256 - signature

Example header:

t=1648120701,sha256=9558642b9b3c8effeb9a568a28cbd0f7ff09cd8b273444a5cb6eda7b53979cf6

Verification is a 2-step process. The first is checking a timestamp. If it is older than e.g. 1min then you should reject a request. The second step is to verify a signature. To do that you need to create a string from:

  • timestamp from request
  • entire request body
 "{timestamp}.{payload}"

Then you need to generate a hash using this string and secret. You can get a secret from this endpoint:

For x-fastauth-signature-256 header you can get a secret from this endpoint:

Every webhook has its own secret. You can save it on your end. It doesn't expire.

For x-fastauth-api-signature-256 header you need to get all secrets from the below endpoint and find the one with property enabled set to true and with type = webhook.

More about secrets: Secrets API

Here is a code in C# we are using for generating a hash. It could be different for other languages but the logic will be the same:

private const int Minute = 60;

public static string GenerateHash(string payload,
string key)
{
var hash = ComputeHash(payload, key);

var stringBuilder = new StringBuilder();

// Loop through each byte of the hashed data
// and format each one as a hexadecimal string.
foreach (var @byte in hash)
{
stringBuilder.Append(
@byte
.ToString("x2"));
}

return stringBuilder.ToString();
}

public static bool VerifyHash(string hash,
long timestamp,
string payload,
string key)
{
var currentTimestamp = DateTime.UtcNow.ToUnixTimestamp();

if (currentTimestamp - timestamp > Minute)
{
return false;
}

var computedHash = GenerateHash(payload, key);

if (computedHash != hash)
{
return false;
}

return true;
}

private static IEnumerable<byte> ComputeHash(string payload,
string key)
{
using (var hmac = new HMACSHA256(Encoding.UTF8.GetBytes(key)))
using (var memoryStream = new MemoryStream(Encoding.UTF8.GetBytes(payload)))
{
byte[] computedHash = hmac.ComputeHash(memoryStream);

return computedHash;
}
}

private static long ToUnixTimestamp(this DateTime date)
{
return (long)Math.Floor((date.ToUniversalTimeWhenUnspecified() - DateTimeOffset.UnixEpoch).TotalSeconds);
}

private static DateTime ToUniversalTimeWhenUnspecified(this DateTime date)
{
if (date.Kind == DateTimeKind.Unspecified)
{
return DateTime.SpecifyKind(date, DateTimeKind.Utc);
}

return date.ToUniversalTime();
}

The request is valid when the hash generated on your side is the same as the hash from the request.