Webhook
A representation of the webhook object
Property
Type
Description
url
string
The URL of the webhook endpoint.
secret
string
The endpoint’s secret used to generate webhook signatures.
events
array
The list of events to enable for this endpoint. Allowed values: ["meetingScheduled", "meetingCancelled", "meetingRescheduled"]
created_at
string
The ISO-8601 time at which the object was created.
uuid
string
Unique identifier (UUID v4) of the object.

The example webhook object

1
{
2
"events":[
3
"meetingRescheduled",
4
"meetingCancelled",
5
"meetingScheduled"
6
],
7
"url":"https://example.com/webhook",
8
"secret":null,
9
"created_at":"2021-05-24T11:04:11+00:00",
10
"uuid":"2ba9ee0b-e62a-43bd-aed0-31b26056ecdc"
11
}
Copied!

The example request that's being made when the meeting is scheduled

Request Method: POST
Request headers:
Header
Description
webhook-signature
Harmonizely can optionally sign the webhook events it sends to your endpoints by including a signature in each event’s Webhook-Signature header. This allows you to verify that the events were sent by Harmonizely, not by a third party
user-agent
The user agent. Always set to Harmonizely.
Request payload:
1
{
2
"data": {
3
"rescheduling": null,
4
"pretty_canceled_at": null,
5
"pretty_scheduled_at": "Wednesday, June 23, 2021 09:30",
6
"pretty_scheduled_at_in_invitee_timezone": "Wednesday, June 23, 2021 at 9:30 AM",
7
"pretty_canceled_at_in_invitee_timezone": null,
8
"event_type": {
9
"name": "Demo Call",
10
"location": null,
11
"location_label": null,
12
"description": null,
13
"duration": 15,
14
"slug": "demo-call",
15
"is_secret": false,
16
"confirmation_page_type": "internal",
17
"confirmation_page_url": null,
18
"notification_type": "email",
19
"pass_details_to_redirected_page": false,
20
"type": "regular",
21
"position": 0
22
},
23
"scheduled_at": "2021-06-23T07:30:00+00:00",
24
"end_date": "2021-06-23T07:45:00+00:00",
25
"invitee": {
26
"first_name": "Bernice",
27
"email": "[email protected]",
28
"full_name": "Bernice J. Cervantez",
29
"timezone": "Europe/Warsaw",
30
"phone_number": "+48123456789",
31
"locale": "en"
32
},
33
"state": "new",
34
"canceled_at": null,
35
"uuid": "601f15fb-c7e8-4988-863e-78a6ac4446df",
36
"notes": null,
37
"details": null,
38
"answers": [
39
{
40
"question_label": "Details",
41
"value": "My extra details",
42
"question_type": "textarea"
43
},
44
{
45
"question_label": "Agree to terms?",
46
"value": 1,
47
"question_type": "checkbox"
48
}
49
],
50
"location": "https://zoom.us/j/xxxxxx",
51
"cancellation": null,
52
"payment": null
53
},
54
"event": "meetingScheduled",
55
"uuid": "ccc3d816-c44d-4a38-9eb1-e1c7d05538dc"
56
}
Copied!

Verifying signature manually

Harmonizely generates webhook signatures using a hash-based message authentication code (HMAC) with SHA-256 which is then base64 encoded.
  1. 1.
    Determine the expected signature
Compute an HMAC with the SHA256 hash function and encode it using base64. Use the webhook’s signing secret as the key, and use the request's payload string as the message.
Example in PHP:
1
$signature = base64_encode(hash_hmac('sha256', $payload, $secret, true));
Copied!
2. Compare the signatures
Compare the signature in the webhook-signature header to the expected signature.
Last modified 6mo ago