Subscribe to event notifications and poll for sample data.
Webhook verification
HiringCenter Pro signs outbound webhook requests using a per-endpoint secret and includes a signature header X-HiringCenter-Pro-Signature.
Header format: t=<unix_timestamp>,v1=<hex_hmac>
To verify the signature:
- Read the exact raw request body string (not the parsed JSON).
- Build the signed payload as
${t}.${rawBody}wheretis the timestamp from the header. - Compute
expected = HMAC_SHA256(endpointSecret, signedPayload)and hex-encode it. - Compare
expectedto thev1value from the header using a constant-time comparison. - Enforce a timestamp tolerance window (for example, 300 seconds) to mitigate replay attacks.
Node.js example:
Code
Subscribe to Webhook Events
POST
https://api.hiringcenterpro.com/v2
/webhooks/subscribe
Headers
Authorizationstring · requiredBearer API key in the format 'Bearer <YOUR_API_KEY>'
Request Body
hookUrlstring · uri · required
accountIdstringeventTypestringOne of prospect.created or prospect.updated
Responses
Existing Reactivated
subscriptionIdstring · requiredhookIdstring · requiredhookUrlstring · uri · requiredeventTypestring · requiredOne of prospect.created or prospect.updated
endpointSecretstringsubscribedbooleancreatedAtinteger · int64updatedAtinteger · int64

