Callback Signature Verification#
Each callback request includes a parameter named sign.
This value is used to verify that the request was generated by our system
and that the payload has not been modified.How the Signature is Generated#
- The sign field is removed from the payload (if present).
- The remaining data is converted directly into a query string format (e.g., key=value&key2=value2).
- An HMAC-SHA256 hash is generated using this query string and your secretKey.
- The resulting lowercase hexadecimal hash is sent as the sign value.
- Get the sign value from the callback request.
- Remove the sign field from the received data.
- Generate the HMAC-SHA256 hash using the same data and your secretKey.
- Compare your generated hash with the received sign.
- If both values match, the callback is valid.
Important: The data must be processed in the exact same order as it is received.
Do not reorder or sort the parameters.Modified at 2026-02-09 20:56:01