Optional signing secret for HMAC-SHA256 validation. When provided, webhook
requests will include an X-Webhook-Signature header. Must be at least 12
characters. Recommended for security. Should be a random, cryptographically
secure string.
Optional custom HTTP headers to send with each webhook request. Provided as key-value pairs where both keys and values are strings. Maximum 10 headers allowed, each value max 255 characters.Blocked headers (cannot be customized): Authorization, X-Webhook-Signature, Content-Type, Host, Cookie, X-CSRF-Token, Content-Length, and others reserved for security.Example:
403 Forbidden – The token does not have manage-integrations ability or insufficient form permissions.404 Not Found – Form not found.422 Unprocessable Entity – Validation error (e.g., invalid webhook URL, webhook_secret too short, blocked header).
Copy
{ "message": "The given data was invalid.", "errors": { "data.webhook_url": ["The webhook url must be a valid URL."], "data.webhook_secret": ["The webhook secret must be at least 12 characters."], "data.webhook_headers": ["The 'Authorization' header cannot be customized for security reasons."] }}
If you provide a webhook_secret when creating the webhook, OpnForm will sign each webhook request with an HMAC-SHA256 signature. This allows you to verify that the webhook came from OpnForm and hasn’t been tampered with.Each webhook request will include:
X-Webhook-Signature header: Contains the signature in format sha256=HEXADECIMAL_VALUE
Custom headers: Any headers you specified in webhook_headers (except blocked headers)