{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
This event is generated when a refresh token is revoked. The JSON includes either the User Id and User or the Application Id depending on what was revoked. It will also include the time to live duration (in seconds) for each Application. This value is used to determine if JWTs are valid or not based on their expiration instants.
The following scenarios will cause this event to be generated:
This example JSON would reflect a scenario where a single refresh token is revoked for a single user for a single application.
A map of Application Id to the configured time to live (TTL) for the access token (JWT). This can be used to identify the maximum amount of time after this event occurred where an un-expired access token may be held by a user.
If you take the
This map will contain a single entry for the application represented by the
{eventType}
.
This example JSON would reflect a scenario where all refresh tokens owned by a single user are revoked.
A map of Application Id to the configured time to live (TTL) for the access token (JWT). This can be used to identify the maximum amount of time after this event occurred where an un-expired access token may be held by a user.
If you take the
This map will contain a single entry for the application represented by the
{eventType}
.
This example JSON would reflect a scenario where all refresh tokens issued for a specific application are revoked.
A map of Application Id to the configured time to live (TTL) for the access token (JWT). This can be used to identify the maximum amount of time after this event occurred where an un-expired access token may be held by a user.
If you take the
This map will contain a single entry for the application represented by the
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
This event is generated when a User Action is taken on a user and when temporal actions transition between phases.
A temporal action is one that has a start time and a duration. When a phase transition occurs for a temporal action, an event will be sent to the webhook. See the
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.{/* eslint-disable-line */}
{eventType}
.
{eventType}
.
{eventType}
.{/* eslint-disable-line */}
{eventType}
.
{eventType}
.{/* eslint-disable-line */}
{eventType}
.{/* eslint-disable-line */}
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
This event is generated when a user registration is created.
The final state of the operation which caused the webhook is not persisted to FusionAuth until after the webhook finishes; [learn more](/docs/extend/events-and-webhooks/writing-a-webhook#calling-fusionauth-apis-in-webhooks).
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
{eventType}
.
This event is generated when a user is updated. The event will include the before and after versions of the User being updated.
This event is currently generated each time a user logs in via an IdP, such as Google, or OIDC -- even if the user data or user details in the IdP have not been modified.
{eventType}
.
This is a protected application.
``` Then, start a python web server. ```shell title="Start the web server" python3 -m http.server ``` You should be able to visit `http://localhost:8080` and see something like this.