In rare cases, such as network retries, read timeouts, processing delays, or delivery failures, the same webhook might be sent more than once for the same event. To prevent unintended side effects, implement idempotency in your webhook handler to handle duplicate deliveries.
Add webhooks
Add your webhook URL in our system for us to deliver webhook events. Follow the instructions below to configure the webhook URL. Ensure to provide the publicly accessible HTTPS URL to your webhook endpoint.- Log in to the Merchant Dashboard and click Developers.
- Click Webhooks listed under the Secure ID card.
- Click Add Webhook URL in the Webhook screen.
- In the Add Webhook popup, enter the webhook URL.
- Click Test & Add Webhook.

Add Webhook
Webhook signature
You will receive the webhook signature in the webhook header. Here is a sample header from a webhook request.Header Name | Header Value |
---|---|
content-length | 1099 |
x-webhook-attempt | 1 |
content-type | application/json |
x-webhook-signature | 07r5C3VMwsGYeldGOCYxe5zoHhIN1zLfa8O0U/yngHI= |
x-webhook-timestamp | 1746427759733 |
Always capture the webhook payload in its raw text format before parsing into JSON. Parsing and reserialising the payload can change the structure (for example, array ordering, spacing, or
null
handling) and cause a signature mismatch during verification. Use the exact raw body string from the request when computing the signature.Webhook event
Event Type | Description |
---|---|
DIGILOCKER_VERIFICATION_SUCCESS | Triggered when the user’s DigiLocker verification is successfully completed. |
DIGILOCKER_VERIFICATION_LINK_EXPIRED | Triggered when the DigiLocker URL expires due to user inaction. |
DIGILOCKER_VERIFICATION_CONSENT_DENIED | Triggered when the user denies consent for DigiLocker verification. |
DIGILOCKER_VERIFICATION_CONSENT_EXPIRED | Triggered when the user’s document consent for DigiLocker verification expires, which occurs 1 hour after the user grants consent. |
DIGILOCKER_VERIFICATION_FAILURE | Triggered when the DigiLocker verification fails due to a system error. |
Sample webhook events
The following are examples of webhook events that you may receive.Webhook payload fields
The webhook payload contains important metadata in its top-level fields.Field | Type | Description |
---|---|---|
event_type | string | Indicates the type of event that triggered the webhook. |
event_time | string | The UTC timestamp of when the event occurred, formatted in ISO 8601 (YYYY-MM-DDTHH:MM:SSZ ). |
version | string | Indicates the webhook format being used. Default version is “v1”. |
data | object | Contains event-specific details related to this feature. |
Verifying the signature is mandatory before processing any response.
Signature Verification
Every DigiLocker webhook contains a signature (x-webhook-signature
) in the header.
The verification process is as follows:
- Extract the
x-webhook-timestamp
from the headers. - Concatenate the timestamp and the raw request body (exact payload, unmodified).
- Generate an HMAC-SHA256 hash of this string using your client secret.
- Base64-encode the hash.
- Compare it with the
x-webhook-signature
header value. If they match, the webhook is valid.
- Always use the raw request body and not a parsed JSON object. This prevents signature mismatch.
- Reject the webhook if the signature does not match.