The domain name holder
- must be either
- one of these types of business enterprise or organization registered in the Central Coordinating Register for Legal Entities or
- a private individual over the age of 18 with a Norwegian national identity number (11 digits)
- must have a mailing address in Norway
- must accept Norid’s terms and conditions (submit a personal statement) before entering the domain name subscription in the registration system
- may register up to 100 domain names if they are a business enterprise or other organization
- may register up to 5 domain names if they are a private individual
The domain name
- must have at least two authoritative name servers
- must be between 2 and 63 characters long
- may only include accepted characters a–z, 0–9, hyphens and national characters
- must not be one of the names on this list of counties, regions, municipalities, cities or large towns
- may be transferred to a new holder; a new subscription will be created
The domain name subscription
- is renewed for one year at a time
- is terminated automatically if the holder dies or is deleted from the Central Coordinating Register for Legal Entities
- a new subscription can be created for a new domain holder in the period before the domain name is deleted.
- If the organization is bankrupt or going through forced dissolution it is the Bankruptcy Act that apply and the trustee in bankruptcy (bobestyrer) control the estate.
Authentication of the domain name holder
As a registrar, you are responsible for authenticating the domain name holder for all types of registrations. You need to substantiate, with a high degree of probability, that the person requesting a registration, deletion, renewal, etc., actually is the person they claim to be, and that they represent the holder.
We have no formal requirements for the authentication process. This means you determine which authentication procedures you want to implement. A signature with a secure electronic ID (BankID or qualified electronic certificate) would be sufficient as documentation, but less secure solutions may also satisfy requirements. The requirement is that you are able to document sound internal procedures for customer authentication. On request, you must be able to both document your own procedures and provide evidence of satisfactory identification in any specific case.