# RDAP user's guide
[RDAP](https://www.icann.org/rdap) is a JSON REST protocol, served over HTTPS,
for retrieving registry information. It returns data similar to the
previously-existing WHOIS service, but in a JSON-structured format. This
document describes the Nomulus system's support for the RDAP protocol.
## Quick example
RDAP information is available via regular Web queries. For example, if your base
domain is `mydomain.com`, and `tld` is a TLD managed by that instance of
Nomulus, enter the following in a Web browser:
```
https://pubapi.mydomain.com/rdap/domains?name=*.tld
```
You should get back a long string of apparent JSON gobbledygook, listing the
first 100 domains under that TLD. There are a number of online JSON formatters;
paste the result string into one of them, and you should be able to scroll
through and see the information. You can also use the Chrome browser developer
console's network pane, then send the request and look at the Preview tab to see
the response in an expandable tree format.
## Introduction to RDAP
RDAP is a next-generation protocol for dissemination of registry data. It has
replaced the WHOIS protocol. RDAP was defined as STD 95 as a series of RFCs:
* [RFC 7480: HTTP Usage in the Registration Data Access Protocol (RDAP)](https://tools.ietf.org/html/rfc7480)
* [RFC 7481: Security Services for the Registration Data Access Protocol
(RDAP)](https://tools.ietf.org/html/rfc7481)
* [RFC 9082: Registration Data Access Protocol (RDAP) Query Format](https://tools.ietf.org/html/rfc9082)
* [RFC 9083: JSON Responses for the Registration Data Access Protocol (RDAP)](https://tools.ietf.org/html/rfc9083)
* [RFC 9224: Finding the Authoritative Registration Data (RDAP) Service](https://tools.ietf.org/html/rfc9224)
Using RDAP, users can send in standard HTTP requests with specific URLs (such as
`.../rdap/domain/example.com` to get information about the domain `example.com`,
or `.../rdap/domains?name=ex*.com` to get information about domains beginning
with `ex` and having the TLD `.com`), and receive back a JSON response
containing the requested data.
## Nomulus RDAP request endpoints
The suite of URL endpoint paths is listed below. The paths should be tacked onto
the usual App Engine server name. For example, if the App Engine project ID is
`project-id`, the full path for a domain lookup of domain iam.soy would be:
```
https://pubapi.mydomain.com/rdap/domain/iam.soy
```
The search endpoints (those with a query string) can return more than one match.
The maximum result set size is limited by a configuration parameter, currently
set to 100.
### /rdap/autnum/
The RDAP protocol defines an autnum endpoint, but autonomous system numbers are
not supported by registries, so queries of this type will always return an
error.
### /rdap/domain/
Look up a single domain by name. The full domain name is specified at the end of
the path.
```
/rdap/domain/abc.tld
```
### /rdap/domains?
Search for one or more domains. The RDAP specification supports three kinds of
searches: by domain name, by nameserver name, or by nameserver IP address. It
defines a wildcard syntax, but allows the server to limit how wildcards are
used; Nomulus' wildcard rules are described below.
A maximum of 100 domains will be returned in response to a single query. If more
than one domain is returned, only data about the domain itself is included. If a
single domain is returned, associated nameservers and contacts are also returned
#### Search by domain name
Domain searches by domain name use the `name` query parameter. The query value
can be a domain name without wildcards, in which case the results will be the
same as a lookup of that name.
```
/rdap/domains?name=abc.tld
```
The query value can include a wildcard at the end of the string. There must be
at least two characters before the wildcard, to avoid very large queries.
```
/rdap/domains?name=abc*
```
Ordinarily, the wildcard must appear at the end of the string. But as a special
exception, the wildcard can be followed by .tld to indicate that only domains
from a specific TLD are desired. In this case, two characters are not required
before the wildcard.
```
/rdap/domains?name=a*.tld
/rdap/domains?name=*.tld
```
#### Search by nameserver name
Domain searches by nameserver name use the `nsLdhName` query parameter (LDH
means letters, digits, hyphen; Unicode nameserver names should be specified in
punycode form).
```
/rdap/domains?nsLdhName=ns1.abc.tld
```
The query value can include a wildcard at the end of the string. There must be
at least two characters before the wildcard.
```
/rdap/domains?nsLdhName=ns*
```
As a special exception, the wildcard can be followed by a domain name managed by
the Nomulus system to indicate that only nameservers subordinate to that domain
are desired. The two initial characters are not required in this case.
```
/rdap/domains?nsLdhName=n*.localdomain.how
/rdap/domains?nsLdhName=*.localdomain.how
```
#### Search by nameserver IP address
Domain searches by nameserver IP address use the `nsIp` query parameter.
Wildcards are not supported for IP address lookup.
```
/rdap/domains?nsIp=1.2.3.4
```
### /rdap/entity/
Look up a single entity by name. The entity ID is specified at the end of the
path. Because the registry does not store contact data, only registrar entities
may be looked up (by IANA registrar ID). Registrar contacts are also returned in
results as entities, but cannot be looked up by themselves; they only appear as
part of information about a registrar.
```
/rdap/entity/registrar-id
```
### /rdap/entities?
Search for one or more registrars. The RDAP specification supports two kinds of
searches: by full name or by handle. The visibility of registrar information,
including registrar contacts, is determined by the registrar's chosen WHOIS/RDAP
visibility settings.
#### Search by full name
Entity searches by full name use the `fn` query parameter, matching the
registrar name.
```
/rdap/entities?fn=tucows
```
A trailing wildcard is allowed, but at least two characters must precede the
wildcard.
```
/rdap/entities?fn=tu*
```
#### Search by handle
Entity searches by handle use the `handle` query parameter. Results will include
registrars with a matching IANA registrar number.
```
/rdap/entities?handle=12
```
### /rdap/help/
Retrieve help information. The desired help topic is specified at the end of the
path; if no topic is specified, the help index is returned.
```
/rdap/help/
/rdap/help/index
/rdap/help/syntax
```
### /rdap/ip/
IP addresses are not supported by registries, so queries of this type will
always return an error.
### /rdap/nameserver/
Look up a single nameserver by fully qualified host name. The name is specified
at the end of the path.
```
/rdap/nameserver/ns1.abc.tld
```
### /rdap/nameservers?
Search for one or more nameservers. The RDAP specification supports two kinds of
searches: by name or by IP address. The format for both is the same as for the
equivalent domain search by nameserver name and IP address, except that the
query parameters used are name and ip. See the domain search section above for
details.
```
/rdap/nameservers?name=ns1.abc.tld
/rdap/nameservers?name=ns*
/rdap/nameservers?name=*.locallydefineddomain.how
/rdap/nameservers?ip=1.2.3.4
```
## Experimental features
As part of the RDAP Pilot Project, Nomulus incorporates a few extra features in
the RDAP endpoints.
### Authentication
The RDAP RFCs do not include support for authentication or access controls. We
have implemented an experimental version that allows for authenticated access to
sensitive data such as information about deleted domains. We do this by
leveraging the existing authentication/authorization functionality of Nomulus'
registrar console. Requests which can be authenticated as coming from a specific
registrar have access to all information about that registrar's contact.
Requests authenticated as coming from administrators of the GCP project have
access to all information. In other cases, the sensitive data will be hidden.
RDAP uses the same logic, but the registrar association is used only to
determine whether the request can see deleted items. Unauthenticated requests
can still retrieve data, but deleted items will not be visible.
To use RDAP in an authenticated fashion, first set up your email address for use
in the registrar console, as described elsewhere. Then check that you have
access to the console by loading the page:
```
https://mydomain.com/console
```
If you can see the registrar console, you are logged in correctly. Then change
the URL to an RDAP query on that same Nomulus instance, and you will be able to
see all data for your associated registrar.
### `registrar` parameter
Ordinarily, all matching domains and hosts are included in the returned result
set. A request can specify that only items owned by a specific registrar be
included, by adding an extra parameter:
```
/rdap/domains?name=*.tld®istrar=registrar-client-string
```
This could be useful when designing a registrar user interface that uses RDAP as
a backend. Note that this parameter only excludes items; it does not cause items
to be shown that otherwise would not.
### `includeDeleted` parameter
Ordinarily, deleted domains and hosts are not included in search results.
Authorized requests can specify that deleted items be included, by adding an
extra parameter:
```
/rdap/domains?name=*.tld&includeDeleted=true
```
Deleted items are shown only if the request is authorized for the registrar that
owns the items, or if the request is authorized as an administrator. This
parameter can be combined with the registrar parameter.
### `formatOutput` parameter
By default, the JSON responses contain no extra whitespace. A more readable
formatted version can be requested by adding an extra parameter:
```
/rdap/domains?name=*.tld&formatOutput=true
```
The result is still valid JSON, but with extra whitespace added to align the
data on the page.
### Next page links
The number of results returned in a domain, nameserver or entity search is
capped at a certain number. If there are more results than the limit, two
notices will be added to the returned JSON. The first is a standard Search
Policy notice, indicating that the results have been truncated. The second has a
title of `Navigation Links`, and a links section containing a link with `rel`
type `next`. This link can be used to retrieve the next page of results (which
may have a further link, and so on until all results have been retrieved).
The links are not foolproof, and caution should be exercised. If a matching
record is added or deleted between the time successive pages are requested, a
gap or a duplicate may appear.
Here are examples of the notices which will appear when the result set is
truncated.
```
"notices" :
[
{
"title" : "Search Policy",
"type" : "result set truncated due to unexplainable reasons",
"description" :
[
"Search results per query are limited."
]
},
{
"title" : "Navigation Links",
"links" :
[
{
"type" : "application/rdap+json",
"href" :
"https://pubapi.mydomain.com/rdap/domains?name=abc*.tld&cursor=a5927CDb902wE=",
"rel" : "next"
}
],
"description" : [ "Links to related pages." ],
},
...
```