Validate tickets with webhooks
Validate ITSM ticket IDs through the Apono webhook integration
Many organizations require that every access request corresponds to a valid ticket in their IT Service Management (ITSM) platform, such as Jira, ServiceNow, or Zendesk.
Apono’s webhook integration allows you to validate ticket IDs automatically before a request is submitted, ensuring that all requests are auditable, compliant, and properly linked to existing incidents or stories.
When this feature is enabled, end users are prompted to enter a ticket ID in the access request form. A webhook checks the ticket’s validity against your ITSM system before submission is allowed.
Prerequisites
ITSM user account
Service account or user profile in your ITSM platform with permissions to read ticket or incident data
This user will be used by Apono to verify whether the provided ticket ID exists.
Ticket ID field setup
Ticket ID enablement for your Apono account
Contact Apono Support to enable a ticket ID custom field in your account.
Apono Support requires the following information to enable the custom field for your request forms:
Preferred field name to appear in the Apono UI (such as Ticket ID)
Preferred field parameter (such as
ticket_id)
API authentication token
API token or credential for your ITSM user
See your ITSM documentation for more information:
If using Basic authentication, you must encode your credentials in Base64 format, such as the following: Basic <base64encoded(email:api_token)>
Learn how to generate the encoded string in Base64.
Configure a webhook

Follow these steps to configure an Apono webhook to validate your ITSM tickets:
On the Webhooks page, click Add Webhook. The Add Webhook page appears.
Click Manual.
Enter a unique, alphanumeric, user-friendly Manual Webhook Name for identifying this webhook.
Click the Status toggle to Active.
From the Type dropdown menu, select HTTP Webhook.
From the Method dropdown, select GET or POST, depending on your ITSM API requirements.
In the URL field, enter the route for your ITSM’s ticket or incident lookup API, using the format below. Be sure to replace
<YOURDOMAIN>with your ITSM domain.
https://<YOURDOMAIN>/rest/api/3/issue/{{data.custom_fields.ticket_id}}In the Body Template field, construct an empty JSON body for the webhook payload.
{}In the Headers section, add your ITSM Basic authentication token.
Ensure your token or key has sufficient permission to read ticket data. If your ITSM supports bearer tokens (such as ServiceNow or Zendesk), replace Basic with Bearer.
Authorization
Basic <ENCODED_TOKEN>
From the Authentication Type dropdown menu, select None.
(Optional) From the Triggers dropdown menu, select one or more triggers for the webhook. By default, Manual is selected.
(Optional) In the Timeout in seconds field, enter the duration in seconds to wait before marking the request as failed.
(Optional) Define Response Validators to verify that the response from the webhook meets specified criteria:
Click + Add. A row of settings appears.
Starting with $.data., enter the Json Path of the JSON parameter.
In the Expected Values field, enter a value and press the Enter key on your keyboard.
Repeat step c to add several expected values.
Repeat steps a-d to add multiple response validators.
In the Custom Validation Error Message field, add a clear message to be displayed to end users if the webhook fails (such as, The ticket ID you entered could not be validated).
Click Save Webhook.
The new webhook appears in the Webhooks table. Active webhooks are marked with a green dot. Inactive webhooks are marked with a white dot.
Apono notifications will be sent to your target system when the status of an integration has changed to a warning or error state.
Usage
Now that the webhook is configured, you can add it as a custom approver to an access flow, so that the webhook automatically checks a ticket’s validity before access approval is submitted.
Follow these steps to add the webhook to an access flow:
When setting up custom approval, select Custom Approval as the approver attribute (step 3) and your newly configured webhook as the value (step 5).
Click Save.
Last updated
Was this helpful?
