Tesser signs every outgoing webhook request with an Ed25519 asymmetric signature. You should verify this signature on your server before processing the payload.
Signature Header
Each webhook request includes the following headers:
| Header | Description |
|---|---|
X-Tesser-Signature | Base64-encoded Ed25519 signature of the request body |
Content-Type | Always application/json |
User-Agent | Tesser-Webhooks/1.0 |
The signature is computed over the exact UTF-8 bytes of the JSON request body. Do not parse and re-serialize the body before verifying — use the raw bytes.
Public Key
Tesser's webhook public key is provided in SPKI DER format, base64-encoded. You can also import it from the SDK types package:
Code
Verifying Signatures
Code
Important Notes
- Always verify using the raw request body bytes. Parsing the JSON and re-serializing may change whitespace or key order, which will invalidate the signature.
- If verification fails, respond with
401and do not process the event. - The public key may be rotated in the future. Key rotation will be announced in advance and communicated through the Tesser Dashboard.
Last modified on