Webhooks
Stay updated with real-time notifications via our Webhooks service.
Overview
Webhooks instantly inform your application about significant events, such as payroll submissions or updates, without the need for polling.
Use Cases:
- Alerting when users submit or create payroll data. This use case can be handled by subscribing for event of type
user-payroll-submitted
- Notifying upon successful account linkages. Not yet supported as event type.
- Triggering actions after data updates. Not yet supported as event type.
Webhooks are system-wide meaning subscriptions are not limited to specific users or accounts. For example, if any user updates their payroll with the user-payroll-submitted
subscription enabled, a webbook will be delivered with the respective user information enclosed.
Quick Reference:
- Webhooks List: Detailed descriptions of all events you can subscribe to.
- Setup Guide: Instructions for subscribing and managing webhooks.
Supported Event:
user-payroll-submitted
- notifies when any user creates an entry with new payroll data. Includes the payroll data entry as json ifinclude_payload
is set in the configuration.- No more events are supported at the moment.
Setting Up Webhooks
Create a webhook by sending a POST request. Specify which events to monitor and where to send notifications.
- events: Choose events like
user-payroll-submitted
for targeted notifications. - name: Label your webhook for easier management.
- url: Your endpoint to receive webhook payloads.
- signing_secret: (Optional) A secret for secure webhook verification.
- encryption_key: (Optional) A Base64-encoded 32-byte key used to encrypt webhook payloads.
Verifying Webhooks
If the optional signing_secret
was provided in the webhook subscription, it can be used to validate incoming webhook
signatures, ensuring data integrity and authenticity.
When encryption is enabled, the message is first encrypted and then signed. Therefore, the signature should be verified against the encrypted message, not the decrypted content.
To verify if a received webhook event is authentic:
- Encode the webook payload with the
signing_secret
usingHMAC-SHA512
. You can then check that the result of this encoding matches the contents in theX-Teal-Signature
header. If it matches then the webhook received is genuine. Example verification:
If your signing_secret
was mysecret
and you received the following webhook payload:
The signature to check against would be:
Example of verifying signature:
Generating Encryption Keys
If you want to use encrypted webhooks, you’ll need to provide a 32-byte encryption key encoded in Base64 when creating your webhook. Here’s how to generate a secure random key in different languages:
Decrypting Webhook Payloads
When you provide an encryption_key
, the webhook payload will be encrypted using AES/GCM/NoPadding. To decrypt:
- The encrypted payload is sent in the request body
- The initialization vector is provided in the
X-Teal-Encryption-IV
header (Base64 encoded)
Here’s how to decrypt the payload in different languages:
Webhook Management
Viewing subscriptions
List your current webhooks with a simple GET request to our webhook endpoint GET /webhooks
.
Deleting subscriptions
Unsubscribe using the webhook ID in the request DELETE /webhooks/{webhook_id}
Best Practices
- Secure Endpoints: Ensure your webhook URL is HTTPS-secured to safeguard transmitted data.
- Manage Secrets: Keep your
signing_secret
andencryption_key
confidential. - Use Encryption: Consider using the encryption feature when your team doesn’t control HTTPS termination and you want payloads to be decrypted only by applications possessing the encryption key. As an example, this could help prevent sensitive or GDPR-regulated information from being logged in systems not designed to handle such data (there might be more cases for your specific situation).
- Alternative to Encryption: As an alternative to encryption, consider disabling the payload in webhooks by not setting
include_payload
in your webhook configuration. - Regular Review: Periodically check your webhook subscriptions and adjust as needed to match your application’s requirements.
Leverage our webhooks to make your application more dynamic and responsive to changes without the overhead of continuous polling.
Webhook Example
Example of webhook request body configured to include the payload by setting
"include_payload": "true"
in POST /webhooks
request body.
If the payroll data comes from uploading a payslip the account_id
whould be null
but document_external_id
and document_filename
would be populated
is related to uploading a payslip.