API key issued at onboarding. Passed as a Bearer token in the Authorization header: Authorization: Bearer <api-key>. Identifies the caller and determines organization scope. Invalid or revoked keys return 401 with error type authentication_error.
Ed25519 or RSA-SHA256 asymmetric signature over the request payload (ADR-0015). Provides request integrity and non-repudiation. The signature covers the HTTP method, path, query string, request body, and timestamp. Invalid signatures return 401 with error type authentication_error.
Unix timestamp (seconds) of when the request was signed. Server rejects requests where the timestamp drifts beyond +/-60 seconds from server time to prevent replay attacks. Must match the timestamp used in the signature computation.
Unique identifier of the webhook subscription (wsub_ prefix). Webhook subscription resource identifier.
^wsub_[A-Za-z0-9]+$"wsub_01953e1a5f4b700a"
Webhook subscription details.
A webhook subscription that receives event deliveries.
Webhook subscription resource identifier.
^wsub_[A-Za-z0-9]+$"wsub_01953e1a5f4b700a"
Fully qualified URL.
"https://example.com"
Event types to subscribe to. Use ["*"] for all events.
Status of a webhook subscription.
active, suspended, disabled UTC timestamp in RFC 3339 / ISO 8601 format.
"2026-02-23T12:00:00Z"
Consumer-defined key-value store. Available on all primary resources. Max 50 keys. Keys must match ^[a-zA-Z0-9_]{1,40}$. Values are strings (max 500 chars) or null.
UTC timestamp in RFC 3339 / ISO 8601 format.
"2026-02-23T12:00:00Z"