This article explains how to authenticate or validate webhook calls that are made from a Clarus WMS automation or integration. Learn about the five important headers that help you identify and validate these requests.
Webhook requests from Clarus WMS automations or integrations send five specific headers. These headers provide crucial information to help you identify and confirm the authenticity of the request sent to your webhook URL.
This header provides the exact URL that initiated the webhook call. This will be the base URL you use to log in to Clarus WMS. Use this to verify the origin of the request.
This header contains the API URL that is linked to the domain. This helps you confirm the associated API endpoint for the originating domain.
This header gives you the subdomain part of the URL that triggered the webhook. For example, it might be 'customer'. This helps pinpoint the specific subdomain from which the call originated.
This header provides the unique ID of the automation that caused the webhook to be triggered. For instance, the ID could be '43'. This allows you to trace which automation initiated the call.
This header provides the ID of the integration that is linked to the automation that triggered the webhook. This is only included if it is set or applicable. For example, the ID could be '723'. This helps identify the specific integration involved.
The values provided in these five headers are essential for you to effectively confirm that the request to your webhook URL is genuine and has come from a trusted source.
Webhook headers are pieces of information sent along with a webhook request. They contain important details about the request's origin and purpose, helping you to identify and validate it.
These headers are crucial because they provide verifiable information about the source of the webhook call, such as the domain, subdomain, and specific IDs of the automation or integration in Clarus WMS. This allows you to confirm that the request is legitimate and not from an unauthorised source.