What this page targets
This page is not about basic voice setup.
It is about preventing abuse at webhook ingress for Voice Call workflows.
Reference:
Minimum rollout checklist
- request signature validation enabled
- timestamp window validation enabled
- one request ID consumed once only
- webhook source restrictions enabled
- rejected requests logged with reason
- call-triggered actions permission-scoped
Implementation flow
Step 1: signature and timestamp
- validate signature algorithm and key version
- enforce bounded timestamp window
- reject out-of-window requests
Step 2: replay protection
- store unique callback request ID
- keep processed IDs in short-term store
- reject duplicate ID and log audit event
Step 3: permission boundary
- allow low-risk actions from voice path
- require extra confirmation for high-risk actions
- separate voice ingress from admin command ingress
Pass criteria
- forged signature requests are rejected
- replayed request IDs are blocked
- requests without trusted source context are rejected
- audit logs explain every rejection
High-frequency failure mapping
-
Symptom: valid requests rejected
Action: inspect timezone and timestamp skew policy -
Symptom: duplicate execution
Action: inspect request ID store TTL and cross-node sharing -
Symptom: false rejects increase under load
Action: inspect verification order and gateway timeout settings
Next step: WebChat and gateway auth troubleshooting.