Unique Domain Authentication Identifier

Last updated

The Unique Domain Authentication Identifier (UDAI) is a case-sensitive, eight-character-long "password" which is a randomly generated unique identifier for every Internet NZ domain name (code ".nz"). [1] [2] The UDAI is made up of letters in both upper and lower case as well as numbers.

The UDAI is the password for the domain and can be used to transfer the ownership of the domain. [1] [3]

When an Internet domain name is registered, the related UDAI is initially generated. However, a new UDAI can be requested by the owner at any time. [1] Registrars are obliged to promptly make UDAIs available to registrants upon request and may not withhold them to prevent a domain name from being transferred under any circumstances. [2]

The term UDAI is a term only used in New Zealand. Other countries still require a unique code to transfer a domain, but refer to it as an Auth code or EPP code. [3]


Related Research Articles

The Domain Name System (DNS) is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates more readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols. By providing a worldwide, distributed directory service, the Domain Name System has been an essential component of the functionality of the Internet since 1985.

Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also referred to as HTTP over TLS, or HTTP over SSL.

The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information indicating success or failure when communicating with another IP address, for example, an error is indicated when a requested service is not available or that a host or router could not be reached. ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-user network applications.

The Lightweight Directory Access Protocol is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network. As examples, directory services may provide any organized set of records, often with a hierarchical structure, such as a corporate email directory. Similarly, a telephone directory is a list of subscribers with an address and a phone number.

SSH or Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.

A Uniform Resource Identifier (URI) is a string that provides a unique address where a resource can be found. It looks and is similar to the more commonly known Uniform Resource Locator (URL) that is used to locate web sites and pages within those sites. A URL is a kind of URI - all URLs are URIs, but not all URIs are valid URLs. URLs typically identify web pages that are meant to be viewed in a browser. URIs identify any type of resource, often meant to be used by a computer but not always to be viewed in a browser. The term "URL" most often refers to URIs that name webpages accessed with HTTP, while the term "URI" is used to indicate more general resources like email addresses and local files. URIs often identify resources that are part of an ontology defined using the Web Ontology Language (OWL). For example, the class Agent or the property email in the Friend of a Friend vocabulary would each have an individual URI. URIs have mostly been replaced by Internationalized Resource Identifiers (IRI) which are identical to URIs except IRIs can handle character sets such as Kanji rather than being restricted to ASCII as URIs are.

World Wide Web System of interlinked hypertext documents accessed over the Internet

The World Wide Web (WWW), commonly known as the Web, is an information system where documents and other web resources are identified by Uniform Resource Locators, which may be interlinked by hypertext, and are accessible over the Internet. The resources of the Web are transferred via the Hypertext Transfer Protocol (HTTP), may be accessed by users by a software application called a web browser, and are published by a software application called a web server. The World Wide Web is not synonymous with the Internet, which pre-existed the Web in some form by over two decades and upon which technologies the Web is built.

The HTTP 404, 404 Not Found, 404, 404 Error, Page Not Found, File Not Found, or Server Not Found error message is a Hypertext Transfer Protocol (HTTP) standard response code, in computer network communications, to indicate that the browser was able to communicate with a given server, but the server could not find what was requested. The error may also be used when a server does not wish to disclose whether it has the requested information.

Domain name Identification string that defines a realm of administrative autonomy, authority or control within the Internet

A domain name is an identification string that defines a realm of administrative autonomy, authority or control within the Internet. Domain names are used in various networking contexts and for application-specific naming and addressing purposes. In general, a domain name identifies a network domain, or it represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, a server computer hosting a website, or the web site itself or any other service communicated via the Internet. In 2017, 330.6 million domain names had been registered.

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on ports 1812 and 1813, that provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service. RADIUS was developed by Livingston Enterprises, Inc. in 1991 as an access server authentication and accounting protocol and later brought into the Internet Engineering Task Force (IETF) standards.

Various anti-spam techniques are used to prevent email spam.

A domain name registrar is a company that manages the reservation of Internet domain names. A domain name registrar must be accredited by a generic top-level domain (gTLD) registry or a country code top-level domain (ccTLD) registry. A registrar operates in accordance with the guidelines of the designated domain name registries.

Web traffic is the amount of data sent and received by visitors to a website. This necessarily does not include the traffic generated by bots. Since the mid-1990s, web traffic has been the largest portion of Internet traffic. This is determined by the number of visitors and the number of pages they visit. Sites monitor the incoming and outgoing traffic to see which parts or pages of their site are popular and if there are any apparent trends, such as one specific page being viewed mostly by people in a particular country. There are many ways to monitor this traffic and the gathered data is used to help structure sites, highlight security problems or indicate a potential lack of bandwidth.

BugMeNot is an Internet service that provides usernames and passwords to let Internet users bypass mandatory free registration on websites. It was started in August 2003 by an anonymous person, later revealed to be Guy King, and allowed Internet users to access websites that have registration walls with the requirement of compulsory registration. This came in response to the increasing number of websites that request such registration, which many Internet users find to be an annoyance and a potential source of spam e-mail.

.nz is the Internet country code top-level domain (ccTLD) for New Zealand. It is administered by InternetNZ, with oversight and dispute resolution handled by the Domain Name Commission Limited (DNCL). Registrations are processed via authorised registrars. As of 31 February 2020 there were 709,265 registered .nz domains.

Pharming is a cyberattack intended to redirect a website's traffic to another, fake site. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software. DNS servers are computers responsible for resolving Internet names into their real IP addresses. Compromised DNS servers are sometimes referred to as "poisoned". Pharming requires unprotected access to target a computer, such as altering a customer's home computer, rather than a corporate business server.

An HTTP cookie is a small piece of data stored on the user's computer by the web browser while browsing a website. Cookies were designed to be a reliable mechanism for websites to remember stateful information or to record the user's browsing activity. They can also be used to remember pieces of information that the user previously entered into form fields, such as names, addresses, passwords, and payment card numbers.

Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts. There are many ways in which a malicious website can transmit such commands; specially-crafted image tags, hidden forms, and JavaScript XMLHttpRequests, for example, can all work without the user's interaction or even knowledge. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser.

A Uniform Resource Locator (URL), colloquially termed a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource Identifier (URI), although many people use the two terms interchangeably. Thus http://www.example.com is a URL, while www.example.com is not.</ref> URLs occur most commonly to reference web pages (http), but are also used for file transfer (ftp), email (mailto), database access (JDBC), and many other applications.

References

  1. 1 2 3 "What is a UDAI and how do I request one?", SiteHost.co.nz, 2012, webpage: SHudai.
  2. 1 2 "Common Terms", DNC.org.nz, 2003, webpage: DNC UDAI Definition Archived July 27, 2014, at the Wayback Machine .
  3. 1 2 "Everything You Ever Wanted To Know About Domain Names And Domain Hosting", touchstone.hosting, 2015, webpage: .