Event Types
| Event Type | Description |
|---|---|
credential | A credential (consent, form, signature, mandate) was accepted or rejected |
identity | An identity verification (KYC) was completed |
otp.failed | OTP delivery failed |
Base Event Structure
All webhook events share a common base structure:| Field | Type | Required | Description |
|---|---|---|---|
eventType | string | Yes | Type of event (credential, identity, otp.failed) |
requestId | string | Yes | Request identifier |
internalId | string | No | Your internal identifier for the request |
issuerDid | string | Yes | DID of the organization/issuer |
user | object | Yes | Object containing user identity fields |
decisionDate | Date | Yes | Timestamp when the event occurred |
User Object
| Field | Type | Required | Description |
|---|---|---|---|
contact | string | Yes | User’s contact information (phone or email) |
did | string | Yes | DID of the user/subject |
internalId | string | No | Your internal identifier for the user |
Versioning
Webhook payloads are versioned independently from the API. Each organization has its own webhook version, which determines the format of the payloads you receive. You can manage your webhook version in the Humanos Dashboard. Every webhook payload includes anapi_version field so you always know which format it uses. Your webhook version is automatically set on the first delivery and stays pinned until you explicitly change it.
For more details on how versioning works across the API and webhooks, see API Versioning.
Configuration
To configure the webhook system, organization administrators can navigate to Humanos Admin – Webhooks. The following settings are available:- Webhook URL is the endpoint where all webhook events will be delivered (e.g.,
https://your.domain.com/webhook). - Webhook Signature Secret is used for validating that the webhooks were sent by Humanos.
- Webhook Encryption Secret is used for decrypting the payloads, ensuring security on transit.
- Webhook Encryption Salt is used together with the Webhook Encryption Secret to derive the final encryption key. The salt adds uniqueness and protects against dictionary or pre-computed attacks, ensuring stronger security for each payload.
- Receive the request → Your endpoint will be called with an encrypted payload.
- Verify authenticity → Check the x-signature header using your Webhook Signature Secret.
- Decrypt the payload → Use the Webhook Encryption Secret and Webhook Encryption Salt to decrypt the message and read the event data.
- Process the event → Store it in your system, update statuses, or trigger business logic.
- Respond quickly → Always return 200 OK after successful processing. Humanos retries failed deliveries automatically.