To set up a webhook, you can create one in the “Developers” tab on the sidebar, under the “webhook endpoints” section.

To receive events for webhooks you need to subscribe to events. When creating a webhook endpoint, you can subscribe to the GLOBAL event types.
These events are not associated with a specific workflow or processor and are global to your workspace.

See the Events section for more details on the different event types you can subscribe to.
We support two delivery formats for webhooks:
We also provide the option to send all payloads as a signed download URL over a certain size threshold, which can be configured in bytes when creating/updating a webhook endpoint.
The signed download URL has a one hour expiration time. When manually re-trying a webhook request, a new URL will be generated each time, and when viewing the webhook history for events sent as a URL, a new URL is generated for viewing.
To configure the delivery format, you can select the desired format in the “Advanced options” dropdown when creating/updating a webhook endpoint.

After you have created one or more webhook endpoints from the “Developer” tab, you can subscribe to events for specific workflows by navigating to the desired workflow(s) and opening the “Webhook Subscriptions” menu.

Then you can create new subscriptions for the desired endpoints and event types.


Once subscribed, you will start to receive events to the specified webhook endpoint based on the selected event types each time you run a file(s) through that workflow.
See the Events section for more details on the different event types you can subscribe to and the shape of the payload for each event type.
You can also subscribe to events for specific processor runs. This is necessary if you are running processors directly and not via a workflow.
To start, navigate to the “Overview” tab of the given processor in Studio, click “Webhook Subscriptions”, and then click the “Add webhook subscription” button.

Next, you can select the desired event types you would like to subscribe to and assign the webhook endpoint you would like to receive events at.

Extend will sign each webhook request using a secret unique to the webhook. You can use this signature along with the timestamp to verify that the request is coming from Extend as well as protect against replay attacks.
The easiest way to verify webhook requests is using the SDK’s built-in helper methods. These handle signature verification, timestamp validation, and event parsing automatically.
The signing secret can be found in the webhooks table under the “Developer” tab:

For large payloads, webhooks may be delivered via a signed URL instead of inline. To handle these:
If you’re not using the SDK, you can verify webhook signatures manually:
x-extend-request-timestamp, the body of the request, and the signing secret associated with the webhook.v0:${timestamp}:${requestBody}x-extend-request-signature. If they are equal, then the request is verified to be from Extend.