Learn about the webhooks used by the Session API.
Implement the handler
Register the webhook
POST /v2/session/apps/{appID}/webhooks endpoint.Activate the webhook
POST /v2/session/apps/{appID}/webhooks/{webhookID}/activate endpoint.Verify the webhook
200 OK along with the challenge response to acknowledge receipt of the event. See more details in the Activation Challenge Request page.Start receiving events
200 OK HTTP response to the POST request to acknowledge receipt of the event.Timeout: Prelude will wait up to 10 seconds for your endpoint to respond. If your endpoint doesn’t respond within this timeframe or returns a non-200 status code, the request will be considered failed.Retries: Failed requests will be retried with exponential backoff for up to 2 weeks. Retries are spaced progressively further apart (1 min, 2 min, 4 min, … up to 12 hours) to allow your endpoint time to recover if it’s temporarily down.rsassa-pss-sha256= in the X-Webhook-Signature header of each request to your webhook endpoint.
You can get the public key to verify the signature from the JWKS endpoint of your application.
You can then verify the signature of the webhook events in your webhook endpoint and process the event only if the signature is valid.
user.createduser.deleteduser.profile.updateduser.identifier.createduser.identifier.deleteduser.session.createduser.session.revoked