Security and Idempotency

Punchout endpoints are protected through layered runtime validation and deterministic retry control.

Security layers

Typical checks include:

  • buyer profile resolution
  • buyer authentication
  • IP allowlist validation
  • signature validation (strict mode optional)
  • hook URL validation

This reduces risk from invalid, malformed, or unauthorized requests.

Idempotency

Idempotency keys allow transfer/document endpoints to process retries safely.

Expected behavior:

  • new request processed normally
  • known key can return replay result
  • mismatched payload can return conflict status

Business outcome:

  • fewer duplicate transfers
  • safer integration under network instability

Found an issue with this documentation? Let us know