- Validate webhook signatures from 70+ supported providers in a single place
- Route authenticated webhooks to appropriate services based on the provider
- Prevent webhook spoofing and tampering with cryptographic verification
- Standardize webhook handling across your entire infrastructure
- Apply consistent logging and monitoring to all webhook traffic
1. Create endpoints for your services
Start internal Agent Endpoints for the services that will handle webhooks from different providers. You can also use one of our SDKs or the Kubernetes Operator. For a payment service handling Stripe webhooks:2. Reserve a domain
Navigate to the Domains section of the ngrok dashboard and click New + to reserve a free static domain likehttps://your-service.ngrok.app
or a custom domain you already own.
We’ll refer to this domain as $NGROK_DOMAIN
from here on out.
3. Create a Cloud Endpoint
Navigate to the Endpoints section of the ngrok dashboard, then click New + and Cloud Endpoint. In the URL field, enter the domain you just reserved to finish creating your Cloud Endpoint.4. (Optional) Create a vault and secrets
For production environments, store your webhook secrets securely using Secrets for Traffic Policy. This step is optional—you can also use plaintext secrets directly in your policy. Create a vault to store your webhook secrets:$VAULT_ID
to match the vault ID from the response:
5. Apply Traffic Policy to your Cloud Endpoint
While still viewing your new cloud endpoint in the dashboard, copy and paste one of the policies below into the Traffic Policy editor.6. Try out your endpoint
Visit the domain you reserved either in the browser or in the terminal using a tool likecurl
.
You should see the app or service at the port connected to your internal Agent Endpoint.
Configure your webhook endpoints in each provider’s dashboard:
- Stripe:
https://$NGROK_DOMAIN/stripe
- Slack:
https://$NGROK_DOMAIN/slack
- GitHub:
https://$NGROK_DOMAIN/github
What’s next?
- Read about other gateway shapes you can build with ngrok
- View the complete list of 70+ supported webhook providers including Twilio, Shopify, and DocuSign
- Add the
log
action to send webhook events to your observability platform for monitoring and debugging - Use Traffic Inspector to monitor webhook delivery and troubleshoot validation failures
- Learn more about webhook signature verification and security best practices