API Access and Webhooks
How to generate API keys, authenticate API requests, set up webhooks, and build custom integrations with the JobsiteOn API.
How to generate API keys, authenticate API requests, set up webhooks, and build custom integrations with the JobsiteOn API.
This guide explains how to access the JobsiteOn API for building custom integrations. You will learn how to generate API keys, authenticate requests, set up webhooks, and understand rate limits.
/settings > Workspace > Integrations.Screenshot: The API key generation dialog showing a label field, permission checkboxes for contacts, jobs, invoices, and a Generate button.
Include your API key in the Authorization header:
Authorization: Bearer your_api_key_here
All API requests must use HTTPS. HTTP requests are rejected.
The API base URL is:
https://api.jobsiteon.com/v1
Available endpoints include:
| Endpoint | Methods | Description |
|---|---|---|
/contacts |
GET, POST, PATCH | Manage contacts |
/jobs |
GET, POST, PATCH | Manage jobs |
/invoices |
GET, POST, PATCH | Manage invoices |
/payments |
GET, POST | View and record payments |
/pricebook |
GET, POST, PATCH | Manage pricebook items |
/properties |
GET, POST, PATCH | Manage properties |
Animation: A terminal showing a curl command hitting the /contacts endpoint and receiving a JSON response with contact data.
Webhooks push real-time event notifications to your server.
/settings > Workspace > Integrations > Webhooks.contact.created, contact.updatedjob.created, job.updated, job.completedinvoice.created, invoice.sent, invoice.paidpayment.receivedrequest.createdEach webhook request includes an X-Signature header. Verify this
signature using your API key to confirm the request came from JobsiteOn.
X-RateLimit-Remaining and X-RateLimit-Reset.429 Too Many Requests response.Tip: Use webhooks instead of polling for real-time data. Webhooks push data to you immediately, reducing API calls and latency.
Note: Keep your API keys secure. Never expose them in client-side code, public repositories, or logs. Rotate keys regularly and revoke any that may have been compromised.
Did this answer your question?