Skip to main content

UID2 Sharing: Overview 

In UID2, sharing is a process for distributing either raw UID2s or UID2 tokens between UID2 participants.

All instances where a raw UID2 or UID2 token is shared with another participant fall under the definition of sharing. All sharing participants who send raw UID2s must follow the security requirements specified in the standard security practices. For details, see Security Requirements for UID2 Sharing. We encourage all participants who are sharing UID2 tokens to follow these steps.

Sharing Participants

In UID2, a sharing participant is a company that takes part in distributing raw UID2s or UID2 tokens from one UID2 participant to another, either as a sender or a receiver.

A sharing participant can be a publisher, advertiser, DSP, or data provider, or might have more than one of these roles.

Approved Sharing Scenarios

There are several main sharing scenarios, summarized in the following table.

For examples, see Sharing UID2s: Use Cases.

Sharing ScenarioSenderReceiverSharing ApproachSharing RouteLink for Details
Sharing in the bid streamPublisherDSPSharing UID2 tokens (tokenized sharing)Publisher generates UID2 token and sends it into the bid stream.Tokenized Sharing in the Bid Stream
Sharing via a pixelAny authorized participantAny authorized participantSharing UID2 tokens (tokenized sharing)Sharing via any pixel, such as a tracking pixel or creative pixel.Tokenized Sharing in Pixels
Sharing with another UID2 sharing participant, outside of the bid steam or pixelsAny authorized participantAny authorized participantSharing raw UID2s
or
Sharing UID2 tokens (tokenized sharing)
Sharing by any secure channel, such as via API or Amazon S3 drop.Raw UID2 Sharing
or
Tokenized Sharing from Raw UID2s

UID2 Sharing Approaches

If a sharing participant wants to share UID2s with another authorized sharing participant, there are two possible paths:

Sharing UID2 Tokens

The following are the high-level steps for sharing UID2 tokens (tokenized sharing):

  1. The sender sets up sharing permissions in the UID2 Portal.

  2. The sender does either of the following:

    • Generates UID2 tokens from DII.
    • Encrypts raw UID2s into UID2 tokens.
  3. The receiver decrypts the UID2 tokens into raw UID2s, following the instructions that apply to the sharing scenario (see Approved Sharing Scenarios).

For more information about the options for sharing UID2 tokens, and links to instructions, see Tokenized Sharing Overview.

Sharing Raw UID2s

To share raw UID2s, we expect that both the sender and receiver are sharing participants who have the resources, processes, and facilities in place to ensure that the raw UID2s are not compromised, and who will follow standard security practices as defined in Security Requirements for UID2 Sharing.