Skip to main content
When integrating with Dfns, you might want your applications to receive events as they occur in your Dfns account, so that your backend systems can execute actions accordingly. To start being notified about Webhook Events, you first need to register webhooks. After you register them, Dfns can push real-time event data to your application’s webhook endpoint when events happen in your Dfns account. Dfns uses a POST HTTP request to send webhook events to your app, as a JSON payload which includes a Webhook Event Object. Receiving webhook events are particularly useful for listening to asynchronous events, such as doing a wallet transfer request. More details about Webhook configuration can be found in the API Reference.

Webhooks best practices

Review these best practices to make sure your Webhooks remain secure and work properly.

Respond quickly with a 200

The webhook event handler defined on your server, when it receives a new event from Dfns, should be quick to handle it, and return quickly a 200 status code to indicate that the event was indeed delivered. If your handler expects to do some processing taking longer than a few seconds, you should consider adding this to a queue for processing on your side. Otherwise the request delivering the event might timeout. Also, your handler should catch any error that happens on your side, so it still respond with a 200 response to Dfns, indicating that you received it already, otherwise the same event might be retried a few times and fail all the same.

Verify events are sent from Dfns

Verify webhook signatures to confirm that received events are sent from Dfns. Dfns signs webhook events it sends to your endpoints by including a signature in each event’s X-DFNS-WEBHOOK-SIGNATURE header. This allows you to verify that the events were sent by Dfns, not by a third party. Dfns signatures is a HMAC of the received event payload, using SHA-256 hash function and the webhook secret as the secret. It has this shape:
X-DFNS-WEBHOOK-SIGNATURE: sha256=33008aa9673b764cc752362034dfe49ef466315c45d62b3e8cb8588b23d0d06a
Here is an example function showing how you can validate the webhook event signature:
const crypto = require('crypto')

const WEBHOOK_SECRET = process.env.WEBHOOK_SECRET // the webhook secret you got upon webhook creation
const REPLAY_ATTACK_TOLERANCE = 5 * 60 // 5 minutes

function verifyDfnsWebhookSignature(eventPayload, eventSignature) {
  const messageToSign = JSON.stringify(eventPayload) // this assumes "eventPayload" was already JSON-parsed, and is an object (the full payload of the webhook event)

  const signature = crypto
    .createHmac('sha256', WEBHOOK_SECRET)
    .update(messageToSign)
    .digest('hex')

  const trustedSig = Buffer.from(`sha256=${signature}`, 'ascii')
  const untrustedSig = Buffer.from(eventSignature, 'ascii')

  const isSignatureValid = crypto.timingSafeEqual(trustedSig, untrustedSig) // using a constant-time equality comparison (to avoid timing attacks)

  const now = new Date().getTime() / 1000 // your server unix timestamp
  const isTimestampWithinTolerance = Math.abs(now - eventPayload.timestampSent) < REPLAY_ATTACK_TOLERANCE

  return isSignatureValid && isTimestampWithinTolerance
}

Only listen to event types your integration requires

Configure your webhook endpoints to receive only the types of events required by your integration. Listening for extra events (or all events) puts undue strain on the server and we don’t recommend it.

Handle duplicate events

Webhook endpoints might occasionally receive the same event more than once
We don’t guarantee webhook event uniqueness. You should guard against duplicate event by making sure your your event processing is idempotent.

Receive events with an HTTPS server

If you use an HTTPS URL for your webhook, we validate that the connection to your server is secure before sending your webhook data. For this to work, your server must be correctly configured to support HTTPS with a valid server certificate.

Exempt webhook route from CSRF protection

If you’re using Rails, Django, or another web framework, your site might automatically check that every POST request contains a CSRF token. This is an important security feature that helps protect you and your users from cross-site request forgery attempts. However, this security measure might also prevent your site from processing legitimate events. If so, you might need to exempt the webhooks route from CSRF protection.
class DfnsController < ApplicationController
  # If your controller accepts requests other than webhooks,
  # you'll probably want to use `protect_from_forgery` to add CSRF
  # protection for your application. But don't forget to exempt
  # your webhook route!
  protect_from_forgery except: :webhook

  def webhook
    # Process webhook data in `params`
  end
end

Local Development

To add a new webhook, you first need a http server which can receive requests from public internet. During development, one way to achieve this (without deploying a new server on a cloud provider), is to spin up a local server on your machine (localhost), and then use a tunnel services (eg https://ngrok.com) to create a public url pointing to your local server. As an example, here are steps to create a basic Express server in NodeJS:
  • Create a new npm project, install express
mkdir basic-server && cd basic-server
npm init
npm install express
  • Add a new file index.js :
const express = require('express')

const app = express()
const port = 3000

app.use(express.json())

app.post('/', (req) => {
  console.log('Received event:', req.body)
})

app.listen(port, () => {
  console.log(`Listening on port ${port}`)
})
  • In one terminal, run your server
node index.js
  • In another terminal, start a ngrok tunnel pointing to your local server
ngrok http 3000
  • Now, you can Create a Webhook using the url displayed in the result of above the terminal (looking like “https://xxxxxx.ngrok-free.dev”), and test that the webhook is setup properly by using Ping Webhook. If properly setup, you should see incoming events received by your local server.
If you use a free Ngrok account, every time you re-launch the tunnel you’ll get a new url, so make sure you update the Dfns webhook url to test.
I