Skip to main content
Webhook signing keys let you verify that callback requests are genuinely from DocPipe and have not been tampered with.
Webhook signing key settings page

Why use signing keys

Without signature verification, any HTTP request to your callback URL could impersonate DocPipe. Signing keys let you cryptographically verify each request.

Generating a signing key

  1. Go to SettingsWebhook signing key
  2. Click Generate key
  3. Copy the key and store it securely in your application’s configuration
Store your signing key securely. Treat it like a password. Never expose it in client-side code or commit it to source control.

Verifying signatures

When DocPipe sends a callback, it includes a signature header computed from the request body using your signing key. To verify:
  1. Read the raw request body
  2. Compute an HMAC-SHA256 hash using your signing key
  3. Compare the computed hash with the signature in the request header
  4. Only process the request if they match
See webhooks and callbacks for code examples in multiple languages.

Rotating keys

To rotate your signing key:
  1. Generate a new key in settings
  2. Update your application to accept signatures from both the old and new key
  3. Once all integrations are updated, remove the old key from your application
Plan key rotation during low-traffic periods to minimize the risk of rejected callbacks during the transition.