UID Token definition

UID Token means a 72-character alphanumeric string returned by UIDAI in response to the authentication and Limited KYC request. It will be unique for each Aadhaar number for a particular entity (AUA/Sub-AUA) and will remain same for an Aadhaar number for all authentication requests by that particular entity.
UID Token means a 72-character alphanumeric string generated by the Authority mapped to the Aadhaar number and specific to a requesting entity;
UID Token means a 72-character alphanumeric string returned by UIDAI in response to the authentication and Limited KYC request. It will be unique for each Aadhaar number for a

More Definitions of UID Token

UID Token means a 72-character alphanumeric string returned by UIDAI in response to the authentication and Limited KYC request. It will be unique for each Aadhaar number for a particular entity (AUA/Sub-AUA) and will remain same for an Aadhaar number for all authentication requests by that particular entity. Reference: Point number 10 of in Circular No. 1 of 2018, F. No. K-11020/217/2018-UIDAI (Auth-I), dated 10th January 2018
UID Token means a 72-character alphanumeric string returned by UIDAI in response to theauthentication and Limited KYC request. It will be unique for each Aadhaar number for a particular

Related to UID Token

  • Asynchronous means not simultaneous or concurrent in time. For the purpose of this general rule, asynchronous telecommunication technologies for telemedicine or telehealth services may include audio and video, audio without video, client or member portal and may include remote monitoring. "Asynchronous" does not include voice messages, facsimile, electronic mail or text messages.¶

  • Synchronous means an interaction between a provider and a client or member that occurs at the same time using an interactive technology. This may include audio only, video only, or audio with video and may include remote monitoring.¶

  • FedRAMP means the Federal Risk and Authorization Management Program (see ▇▇▇.▇▇▇▇▇▇▇.▇▇▇), which is an assessment and authorization process that federal government agencies have been directed to use to ensure security is in place when accessing Cloud computing products and services.