Listen for events from deepidv so your integration can automatically trigger reactions
Webhooks allow you to receive real-time notifications when events happen in your deepidv account. Instead of polling the API, deepidv pushes event data to your application’s webhook endpoint as a JSON payload via HTTP POST.Receiving webhook events helps you respond to asynchronous events, such as when a verification session is submitted, verified, or rejected.
You can configure webhooks in the Admin Console under Integrations > Webhooks.When creating a webhook, you’ll provide:
Field
Required
Description
Name
Yes
A label to identify this webhook
Destination URL
Yes
The HTTPS endpoint where events will be sent. Must be publicly accessible
Events
Yes
One or more event types to subscribe to
Description
No
Optional description for your reference
After creating a webhook, deepidv generates a signing secret (prefixed with whsec_). Store this secret securely — you’ll use it to verify that incoming webhook requests are from deepidv.
Your signing secret is only shown once at creation time. If you lose it, you can reset it from the webhook settings, but this will invalidate the previous secret.
Set up an HTTP endpoint that accepts POST requests with a JSON body. Your handler should:
Parse the JSON request body containing the event object
Verify the deepidv-signature header using your signing secret
Return a 200 status code as quickly as possible
Process the event asynchronously (after responding)
deepidv considers any 2xx response a successful delivery. If your endpoint returns a non-2xx status or times out (after 10 seconds), deepidv will retry the delivery.
Every webhook request includes a deepidv-signature header containing your signing secret. Compare this value against the signing secret shown when you created the webhook to verify the request is from deepidv.
Copy
Ask AI
const signature = req.headers["deepidv-signature"];if (signature !== process.env.DEEPIDV_WEBHOOK_SECRET) { // Request is not from deepidv — reject it return res.status(401).json({ error: "Invalid signature" });}
Always verify the deepidv-signature header before processing any webhook event. Without verification, an attacker could send fake events to your endpoint to trigger unintended actions.
If your endpoint doesn’t return a 2xx response or doesn’t respond within 10 seconds, deepidv will retry the delivery. Events are retried with exponential backoff.
Store your signing secret in an environment variable or secret manager — never hardcode it in your application. If you suspect your secret has been compromised, reset it immediately from the Admin Console.