Authentication Ecosystem
In this section
About Authentication
Operational Model
Authentication Requesting Agencies
Authentication Service Agencies
Authentication Documents
Learn how Aadhaar Authentication verifies identity using demographic or biometric details through UIDAI’s secure CIDR system.
Understand the Aadhaar Authentication operation model, key actors and secure data flow within the authentication ecosystem.

Learn about Authentication Requesting Agencies like AUA and KUA, their roles, security requirements and Aadhaar authentication process.

Learn about Authentication Service Agencies (ASAs), their role in secure connectivity with CIDR and Aadhaar authentication services.
Access Aadhaar authentication circulars, regulations, guidelines, onboarding checklists and technical documents for AUAs, KUAs and ASAs.
Content Information
Published on: 13 Apr 2026
Last Updated: 22 May 2026
- Operational Model
- Authentication Requesting Agency
Content Information
Published on: 13 Apr 2026
Last Updated: 22 May 2026