v1.4.0 - HTTP Request Signing and Webhook Key Management
by Agnes Jee Chian HwaOverview
This release introduces HTTP Request Signing as a new authentication method and gives merchants full control over webhook signing key management from the StraitsX Dashboard.
Part 1: New Feature — HTTP Request Signing
We've introduced HTTP Request Signing, an enhanced authentication option that uses Ed25519 asymmetric cryptography (public/private key pairs) to sign API requests. This provides stronger request integrity and origin verification on top of your existing API key.
What's new:
- New authentication method using Ed25519 public/private key pairs.
- New request headers:
X-PUBLIC-KEY-ID,X-TIMESTAMP,X-NONCE,X-SIGNATURE. - Public Key management via the StraitsX Dashboard (upload, view, activate/deactivate, delete).
- Replay protection via nonce uniqueness and timestamp validation (±300 second window).
What you need to know:
- This is an opt-in feature — your existing API key authentication (
X-XFERS-APP-API-KEY) remains fully supported with no changes required. - You can test the signing flow in the Sandbox environment before enabling it in Production.
Updated documentation:
- Guides > Getting Started > Authentication Methods
- Now covers both API Key (token-based authentication) and HTTP Request Signing methods.
- Guides > FAQ > Authentication FAQs > HTTP Request Signing
- Detailed FAQ including canonical string construction, code samples (Python, Go, Node.js, Ruby), and error references.
Part 2: Enhancement — Webhook Signing Key Management
Merchants can now explicitly manage webhook signing secrets from the StraitsX Dashboard. Previously, signing secrets were automatically created alongside API keys and could not be managed independently.
What's new:
- Create new webhook signing secrets
- Activate or deactivate a signing secret
- Delete signing secrets you no longer need
This gives you full control over your webhook signing key lifecycle, including the ability to rotate secrets independently of your API keys.
