How to Verify Aadhaar Number
How to Verify Aadhaar Number Aadhaar is the unique 12-digit identification number issued by the Unique Identification Authority of India (UIDAI) to Indian residents. It serves as a foundational identity document for accessing government services, financial products, subsidies, and digital platforms. However, with increasing digital transactions and regulatory compliance requirements, verifying the
How to Verify Aadhaar Number
Aadhaar is the unique 12-digit identification number issued by the Unique Identification Authority of India (UIDAI) to Indian residents. It serves as a foundational identity document for accessing government services, financial products, subsidies, and digital platforms. However, with increasing digital transactions and regulatory compliance requirements, verifying the authenticity of an Aadhaar number has become critical for businesses, institutions, and individuals alike. Verifying an Aadhaar number ensures that the number is valid, active, and linked to a real individual — reducing fraud, preventing identity theft, and streamlining onboarding processes.
Many organizations — from banks and telecom providers to e-commerce platforms and payroll systems — rely on Aadhaar verification to comply with Know Your Customer (KYC) norms. Incorrect or fake Aadhaar numbers can lead to rejected applications, compliance penalties, or security breaches. Therefore, understanding how to verify Aadhaar number accurately and securely is not just a technical skill — it’s a necessity in today’s digital economy.
This guide provides a comprehensive, step-by-step walkthrough of the methods available to verify an Aadhaar number, including official government portals, third-party APIs, manual checks, and best practices to ensure accuracy and data privacy. Whether you’re an individual checking your own Aadhaar status or a business integrating verification into your workflow, this tutorial will equip you with the knowledge to perform reliable, compliant, and secure Aadhaar verification.
Step-by-Step Guide
Method 1: Verify via UIDAI’s Official Website
The most trusted and secure method to verify an Aadhaar number is through the official UIDAI portal. This method does not require any personal data beyond the Aadhaar number itself and provides real-time status confirmation.
- Open your web browser and navigate to the official UIDAI website: https://uidai.gov.in.
- Locate the “Aadhaar Services” section on the homepage. Click on “Verify Aadhaar Number.”
- You will be redirected to the Aadhaar Verification page. Here, you will see a simple form asking for the 12-digit Aadhaar number.
- Enter the full 12-digit Aadhaar number without spaces or hyphens.
- Complete the CAPTCHA challenge displayed on the screen. This step prevents automated bots from abusing the service.
- Click the “Verify” button.
- The system will process your request and display a confirmation message indicating whether the Aadhaar number is valid or invalid.
- If valid, the page will show the last four digits of the linked mobile number (if registered) and the date of enrollment. No personal details such as name, address, or photo are revealed to protect privacy.
This method is ideal for individuals and small-scale verifications. It is free, secure, and does not require registration or API access. However, it does not provide demographic or biometric confirmation — only validation of the number’s existence in the UIDAI database.
Method 2: Use the mAadhaar Mobile App
The mAadhaar app, developed by UIDAI, allows users to manage their Aadhaar details on mobile devices. While primarily designed for Aadhaar holders, it can also be used to verify an Aadhaar number if you have access to the registered mobile number.
- Download the official mAadhaar app from the Google Play Store or Apple App Store. Ensure you are downloading from the official UIDAI source.
- Open the app and select “Verify Aadhaar Number” from the main menu.
- Enter the 12-digit Aadhaar number you wish to verify.
- Click “Send OTP.” An One-Time Password will be sent to the mobile number linked to the Aadhaar.
- Enter the OTP received on the mobile device.
- Upon successful verification, the app will display the Aadhaar holder’s name, gender, year of birth, and the last four digits of the registered mobile number.
This method provides more information than the web portal but requires access to the mobile number registered with Aadhaar. It is useful for individuals who want to confirm their own details or for authorized personnel who have been granted consent by the Aadhaar holder.
Method 3: Aadhaar Verification via API (For Businesses)
For enterprises, financial institutions, and platforms handling high volumes of verifications, manual methods are impractical. UIDAI provides a secure, scalable API solution called the Aadhaar Authentication API, accessible through empaneled Authentication User Agencies (AUAs) and Key Resource Centers (KRCs).
- Register as an Authentication User Agency (AUA) with UIDAI by submitting an application through the official portal. You must demonstrate compliance with UIDAI’s security and data protection standards.
- Once approved, you will receive credentials (Client ID, Secret Key, and API endpoint) from UIDAI or its authorized partner.
- Integrate the Aadhaar Authentication API into your backend system using HTTPS POST requests. The API supports multiple authentication modes: demographic (name, DOB, gender), biometric (fingerprint, iris), OTP, and static (Aadhaar number only).
- For basic number verification, send a request with the Aadhaar number and request mode set to “e-KYC” or “Aadhaar Number Verification.”
- The API will return a JSON response indicating success or failure, along with a unique transaction ID and timestamp.
- Store the response securely and comply with UIDAI’s data retention and privacy guidelines.
Important: The API does not return full demographic details unless the Aadhaar holder has explicitly consented via e-KYC. Only the verification status and masked data (e.g., last four digits of mobile) are provided without consent. Full e-KYC requires explicit consent and is subject to audit trails.
Method 4: Verify via e-KYC Service
e-KYC (electronic Know Your Customer) is a digital identity verification process that retrieves authenticated demographic and biometric data from UIDAI’s database. It is widely used by banks, NBFCs, insurance providers, and fintech companies.
- Ensure the Aadhaar holder has given explicit consent for e-KYC sharing. Consent can be captured via digital signature, OTP, or biometric authentication.
- Use a UIDAI-empaneled e-KYC service provider (e.g., NSDL, CSC, or certified tech partners).
- Input the Aadhaar number and initiate the e-KYC request.
- The system will send an OTP to the registered mobile number or prompt for biometric authentication at a center.
- Upon successful authentication, the service provider retrieves a digitally signed XML file containing the holder’s name, address, gender, date of birth, photograph, and registered mobile number.
- Download and store the XML file securely. The file is digitally signed by UIDAI and cannot be tampered with.
e-KYC is legally recognized under the Information Technology Act, 2000, and is considered a valid substitute for physical KYC documents. It is the most comprehensive form of Aadhaar verification but requires explicit consent and is subject to stricter compliance rules.
Method 5: Manual Verification via Enrollment Center
If digital methods are unavailable or the Aadhaar number appears suspicious, individuals can visit a nearby Aadhaar Enrollment Center for manual verification.
- Locate the nearest Aadhaar Enrollment Center using the UIDAI website’s “Locate Enrollment Center” tool.
- Carry the original Aadhaar card or printout and a valid photo ID (if available).
- At the center, request a “Aadhaar Status Check” or “Aadhaar Verification” service.
- The operator will scan the Aadhaar number using a UIDAI-certified device.
- The system will display the current status: Active, Locked, Deactivated, or Not Found.
- If the status is active, the operator can print a copy of the Aadhaar details (name, photo, address) with a UIDAI seal for official records.
This method is particularly useful for elderly individuals, those without mobile access, or cases where digital verification fails. It provides physical confirmation and is often required for legal documentation or court-related processes.
Method 6: SMS-Based Verification (Limited Use)
UIDAI offers a basic SMS-based service for individuals who want to check their Aadhaar status without internet access.
- Open your mobile messaging app.
- Send an SMS to 51969 with the following format: UID status <12-digit Aadhaar number>
- For example: UID status 123456789012
- You will receive an automated reply indicating whether the Aadhaar number is active or inactive.
This method provides minimal information — only the status of the Aadhaar number. It does not reveal any personal details. It is useful for quick checks but lacks the security and detail of other methods. Note: This service may not be available in all regions or for all mobile networks.
Best Practices
Always Use Official Channels
Never rely on third-party websites or apps that claim to verify Aadhaar numbers without UIDAI authorization. Many fraudulent sites collect Aadhaar numbers for identity theft or resale on the dark web. Only use the official UIDAI website, mAadhaar app, or empaneled service providers. Look for HTTPS encryption and the UIDAI logo to confirm legitimacy.
Never Share Full Aadhaar Number Publicly
Aadhaar is a sensitive identifier. Avoid sharing the full 12-digit number on social media, public forms, or unsecured websites. Even if a platform claims it’s “for verification,” verify its credentials first. Use masked Aadhaar (e.g., XXXX-XXXX-1234) wherever possible.
Consent Is Mandatory for e-KYC
Under the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, consent is required before any entity can access personal data via e-KYC. Always obtain explicit, informed, and documented consent from the Aadhaar holder before initiating verification. Consent must be recorded as a timestamped digital signature or OTP confirmation.
Store Data Securely and Minimize Retention
If you collect Aadhaar data for verification, store it encrypted and in compliance with the Digital Personal Data Protection Act, 2023. Do not retain Aadhaar numbers longer than necessary. For example, after successful KYC, store only the e-KYC XML file (which is self-contained and signed) and delete the raw Aadhaar number from your databases.
Regularly Update Your Verification System
Aadhaar policies and API protocols change periodically. Ensure your software or platform is updated with the latest UIDAI API specifications. Subscribe to UIDAI’s official newsletter or developer portal to receive alerts about changes in authentication modes, security protocols, or deprecated endpoints.
Train Staff on Aadhaar Compliance
If your organization handles Aadhaar verification regularly, train your staff on data privacy, consent protocols, and secure handling procedures. Misuse of Aadhaar data can lead to legal penalties under Section 40 of the Aadhaar Act and other data protection laws.
Verify Only When Necessary
Do not request Aadhaar verification for non-essential services. For example, a local grocery store or small clinic does not require Aadhaar for basic transactions. Only use Aadhaar for legally mandated purposes such as banking, taxation, or government subsidies. This reduces exposure to data breaches and builds public trust.
Use Masked Aadhaar for Display Purposes
When displaying Aadhaar numbers on documents or screens, always mask the first eight digits. For example: XXXX-XXXX-1234. This practice complies with UIDAI’s guidelines and protects user privacy. The last four digits are sufficient for internal reference without exposing the full identity.
Monitor for Suspicious Activity
Implement monitoring tools to detect unusual patterns — such as multiple failed verification attempts from a single IP address, or repeated use of the same Aadhaar number across unrelated platforms. These could indicate fraud or bot attacks. Set up alerts for such anomalies and report them to UIDAI’s grievance portal if needed.
Tools and Resources
Official UIDAI Tools
- UIDAI Website – https://uidai.gov.in – The primary source for all Aadhaar-related services, including verification, status checks, and updates.
- mAadhaar App – Available on Android and iOS. Enables users to view, update, and verify their Aadhaar details on mobile devices.
- Aadhaar Enrollment Center Locator – Found on UIDAI’s website. Helps users find the nearest center for physical verification or updates.
- Aadhaar Authentication API Documentation – Available to registered AUAs. Provides technical specifications for integrating verification into enterprise systems.
Empaneled e-KYC Providers
These are UIDAI-approved third-party service providers authorized to offer e-KYC and authentication services:
- NSDL e-Governance Infrastructure Limited – One of the earliest empaneled providers offering e-KYC via API.
- CSC e-Governance Services India Limited – Offers e-KYC through Common Service Centers across rural and urban areas.
- Paytm, PhonePe, and other fintech platforms – Many have been empaneled to provide Aadhaar-based KYC for financial services.
- Signzy, Jeevika, and other fintech startups – Specialize in digital onboarding with Aadhaar verification and biometric capture.
Third-Party Verification SDKs and Plugins
For developers building web or mobile applications:
- Signzy SDK – Offers real-time Aadhaar verification, OCR for document upload, and liveness detection.
- AuthBridge – Provides API-based Aadhaar authentication with consent management and audit logs.
- Vernacular AI – Supports Aadhaar verification in regional languages, ideal for multi-language platforms.
Developer Resources
- UIDAI Developer Portal – https://uidai.gov.in/developer – Documentation, sample code, and API keys for registered entities.
- Aadhaar API Sandbox – A test environment for developers to simulate verification requests before going live.
- UIDAI Compliance Checklist – Available for download on the developer portal. Lists all security, privacy, and audit requirements.
Legal and Compliance Resources
- Aadhaar Act, 2016 – The foundational law governing Aadhaar issuance and usage.
- Digital Personal Data Protection Act, 2023 – Governs the collection, storage, and processing of Aadhaar data.
- Reserve Bank of India (RBI) KYC Guidelines – Mandates Aadhaar-based verification for banking and financial services.
- UIDAI Privacy Policy – Outlines how personal data is protected and what rights users have.
Real Examples
Example 1: Bank Onboarding Process
A customer applies for a new savings account at a national bank. The bank’s digital onboarding system uses an empaneled e-KYC provider to verify the customer’s Aadhaar number.
- The customer enters their 12-digit Aadhaar number on the bank’s app.
- The system sends an OTP to the mobile number linked to the Aadhaar.
- The customer enters the OTP and consents to share their e-KYC data.
- The e-KYC provider retrieves the signed XML file from UIDAI and sends it to the bank.
- The bank validates the digital signature, extracts the name, photo, and address, and completes the account opening in under 5 minutes.
- The bank deletes the raw Aadhaar number from its system and retains only the encrypted e-KYC file.
This process reduced onboarding time from 3 days to 5 minutes and eliminated paper-based KYC fraud.
Example 2: Telecom Subscriber Verification
A telecom provider must verify new SIM card applicants under the Department of Telecommunications (DoT) rules.
- The customer visits a retail store and provides their Aadhaar card.
- The store agent uses a UIDAI-certified biometric device to scan the customer’s fingerprint and Aadhaar number.
- The device sends an authentication request to UIDAI’s server.
- UIDAI confirms the biometric match and returns an “Auth Success” response.
- The SIM is activated immediately.
- A transaction log is stored for 12 months as per regulatory requirements.
This method prevents duplicate or fake SIM registrations and has significantly reduced telecom fraud.
Example 3: E-Commerce Platform KYC
An e-commerce platform allows sellers to list products. To prevent fraudulent sellers, the platform requires Aadhaar verification.
- The seller uploads a scanned copy of their Aadhaar card.
- The platform uses an OCR tool to extract the 12-digit number and name.
- The system then calls the UIDAI API for number verification.
- The API returns “Valid” with masked mobile number and enrollment date.
- The platform cross-checks the name on the Aadhaar with the name provided by the seller.
- If they match, the seller is approved. If not, the application is flagged for manual review.
This automated check reduced fraudulent listings by 72% within six months.
Example 4: Government Subsidy Distribution
A state government distributes LPG subsidies directly to beneficiaries’ bank accounts using Aadhaar-based Direct Benefit Transfer (DBT).
- The subsidy database contains Aadhaar numbers of eligible households.
- Each month, the system verifies each Aadhaar number via UIDAI’s API to confirm it is active and not blocked.
- If the number is invalid or deactivated, the subsidy is paused until the beneficiary updates their details.
- This prevents leakage of funds to deceased or ineligible persons.
As a result, the state saved ₹1,200 crore in subsidy fraud over two years.
Example 5: Individual Checking Aadhaar Status
A retiree in rural Bihar receives a message that their pension was rejected due to “Aadhaar mismatch.”
- He visits the nearest Common Service Center (CSC).
- The operator checks his Aadhaar number via the UIDAI portal.
- The system shows: “Aadhaar Number Valid, but Mobile Number Not Registered.”
- The operator helps him update his mobile number on the spot using biometric authentication.
- Within 48 hours, his pension is reactivated.
Simple verification saved him from months of bureaucratic delays.
FAQs
Can I verify someone else’s Aadhaar number without their consent?
No. Under the Digital Personal Data Protection Act, 2023, you cannot verify or access personal data of another individual without their explicit consent. Even if you have their Aadhaar number, you are not permitted to use it for verification unless they have authorized you to do so.
What does it mean if my Aadhaar number shows “Invalid” during verification?
An “Invalid” status means the number is either not enrolled in the UIDAI database, has been deactivated, or is incorrectly entered. Double-check the number for typos. If correct, visit an enrollment center to check for enrollment issues or re-enroll if necessary.
Is Aadhaar verification mandatory for all services?
No. While Aadhaar is mandatory for certain government subsidies, banking, and tax-related services, it is not required for all private services. The Supreme Court of India ruled in 2018 that Aadhaar cannot be made mandatory for non-statutory purposes like school admissions or mobile SIM registration (except for telecom providers under DoT rules).
Can I verify an Aadhaar number without an internet connection?
Yes. You can use the SMS method (UID status <number>) or visit a physical enrollment center. However, these methods offer limited information compared to online verification.
What is the difference between Aadhaar verification and e-KYC?
Aadhaar verification confirms whether the number exists and is active in the UIDAI database. e-KYC retrieves the full demographic profile (name, photo, address, DOB) with the holder’s consent. Verification is a basic check; e-KYC is a full identity proof.
How long does Aadhaar verification take?
Verification via UIDAI’s website or SMS takes under 5 seconds. API-based verification takes 1–3 seconds. e-KYC takes 10–30 seconds depending on network and authentication method.
Can a fake Aadhaar number pass verification?
No. UIDAI’s system validates the number using a checksum algorithm and cross-references it against the central database. Any number that does not match the algorithm or is not enrolled will be rejected. However, fake documents (e.g., printed cards with stolen numbers) may appear legitimate — that’s why biometric or OTP verification is more secure.
What should I do if my Aadhaar is locked?
If your Aadhaar is locked due to multiple failed authentication attempts, you can unlock it via the UIDAI website using your registered mobile number and OTP. Alternatively, visit an enrollment center with proof of identity.
Can I verify an Aadhaar number using a name or address?
No. Aadhaar verification requires the 12-digit number. You cannot search by name or address alone. However, e-KYC can retrieve the Aadhaar number if you have the person’s biometrics or registered mobile number with consent.
Is Aadhaar verification secure?
Yes, when performed through official channels. UIDAI uses end-to-end encryption, digital signatures, and strict access controls. Never use unverified third-party tools — they may capture and misuse your data.
Conclusion
Verifying an Aadhaar number is a critical step in ensuring digital identity integrity across public and private sectors. Whether you’re an individual confirming your own status, a business onboarding customers, or a government agency distributing benefits, accurate and compliant verification prevents fraud, enhances trust, and streamlines operations.
This guide has covered all major methods — from the simple UIDAI web portal to enterprise-grade APIs and biometric authentication. Each method serves a different purpose, and choosing the right one depends on your context: speed, compliance, consent, and scale.
Remember: Aadhaar is not just a number — it’s a digital identity that must be handled with care. Always use official tools, obtain consent where required, mask sensitive data, and stay updated on regulatory changes. By following best practices and leveraging trusted resources, you can ensure that your Aadhaar verification processes are not only effective but also ethical and secure.
As India continues its digital transformation, Aadhaar will remain a cornerstone of identity infrastructure. Mastering its verification is not just a technical skill — it’s a responsibility. Use this knowledge wisely, and contribute to a safer, more transparent digital ecosystem for all.