All resources
Domain Operations

Domain Operations Guide for Agencies: Expiry, Ownership, RDAP, and Handover

A practical domain operations guide for agencies managing client domain expiry, registrar access, RDAP data, ownership, renewal workflows, and handover risk.

Updated 10 May 2026

See exactly where your client domains stand.

Run a free audit on up to 10 domains — SSL expiry, domain expiry, and DNS health in one report. No signup needed.

Domain operations for agencies means knowing which client domains exist, who owns them, where they are registered, when they renew, who has access, what public expiry data is available, and what needs to happen before a domain renewal becomes a client-facing problem. It is less glamorous than launch work, but it is one of the easiest places for agencies to lose control of a client website.

The operating goal is not to become a registrar. It is to maintain a clear record of domains, owners, renewal windows, DNS providers, registrar access, and handover notes. Use the free 10-domain agency audit for portfolio-level visibility and the single-domain health check when you need a fast public check for one domain. CertPilot explains its public RDAP/domain, DNS, and certificate data sources in the CertPilot methodology.

Quick answer: domain operations for agencies

Domain operations is the agency workflow for keeping client domains visible and accountable. It covers:

  • Domain inventory.
  • Registrar and DNS provider.
  • Renewal date and renewal owner.
  • Public expiry data availability.
  • Auto-renewal uncertainty.
  • Client-owned vs agency-managed ownership.
  • Registrar access and recovery path.
  • DNS and SSL dependencies.
  • Handover documentation.
  • Client-ready reporting.

The domain expiry monitoring guide covers expiry monitoring in depth. This pillar explains the broader operating model around ownership, access, renewal, handover, and reporting.

Who this guide is for

This guide is for agencies and MSPs that manage client websites, landing pages, DNS, SSL, or care plans but do not always own the client registrar account.

It is useful for:

  • Agency owners who want fewer domain surprises.
  • Account managers preparing client renewals.
  • Technical leads inheriting old client domains.
  • MSPs managing mixed registrar access.
  • Web developers preparing launch and handover.
  • Operations teams building monthly proof reports.

If a client has ever said "I thought you owned the domain" or "we do not know who has the registrar login," this workflow applies.

Why domain operations fail in agencies

Domain operations fail because responsibility is split. The client may own the registrar. The agency may manage DNS. The host may manage SSL. IT may manage MX records. A previous vendor may still have access. Renewal emails may go to a departed employee.

The failure usually appears as an emergency:

  • Domain expiry warning arrives late.
  • DNS provider changes unexpectedly.
  • Registrar login is unknown.
  • SSL renewal is blocked by DNS ownership.
  • Email fails after nameserver migration.
  • Handover is incomplete at client offboarding.

The fix is not to centralize every domain under the agency. That may be wrong for many client relationships. The fix is to keep ownership and renewal workflow explicit.

The domain operations operating model

| Domain operation area | What to track | Risk if missing | Review frequency | |---|---|---|---| | Domain inventory | Root domains, aliases, parked domains | Important asset forgotten | Onboarding and quarterly | | Registrar | Provider and account owner | Renewal path unclear | Onboarding and annual | | Expiry date | Public date when available | Late renewal escalation | Monthly | | Renewal owner | Client, agency, registrar, IT, vendor | No one takes action | Monthly | | Nameservers | DNS authority | Whole zone can move silently | Monthly or after changes | | DNS provider | Where records are edited | SSL/email changes delayed | Onboarding and changes | | Handover notes | Access, contacts, limits | Offboarding confusion | Every handover |

The model is simple: inventory the domain, assign an owner, track the renewal window, document access, watch public signals, and report exceptions.

Domain inventory

A domain inventory should include more than the primary website domain. Agencies should list:

  • Main brand domain.
  • Redirect domains.
  • Campaign domains.
  • Country-code domains.
  • Old brand domains.
  • Client-owned SaaS or portal domains.
  • Domains used only for email.
  • Domains with active DNS but no current website.

The client website health report template is useful when converting that inventory into a client-facing review. For broader tracking, connect the domain inventory with DNS monitoring for agencies.

Registrar ownership and access

Registrar ownership determines who can renew the domain, change nameservers, unlock the domain, or move it. Agencies should document:

  • Registrar name.
  • Account owner.
  • Billing owner.
  • Technical contact if known.
  • Renewal setting if the client can confirm it.
  • Emergency contact.
  • Whether the agency has delegated access.
  • Whether domain lock or transfer lock is enabled.

Do not assume the agency should always own the registrar account. Some clients should keep direct ownership. The agency still needs to know the access path.

RDAP vs WHOIS

RDAP is the modern protocol used to retrieve public domain registration data. WHOIS is older and less structured. In practice, public domain data can be incomplete, redacted, registry-specific, or unavailable for some TLDs.

CertPilot uses public domain data where available to help agencies monitor expiry and related signals. It does not store registrant personal data as a client CRM, and it does not replace registrar-side records. When public data is missing or ambiguous, the agency still needs internal documentation.

Expiry date visibility and limitations

Some domains expose clear expiry dates through public sources. Others do not. Registry behavior, privacy practices, and TLD rules can affect visibility.

Agencies should treat public expiry data as a monitoring signal, not the only source of truth. The registrar account remains authoritative for renewal settings, payment method, and account status.

The support article client domain about to expire explains what to do when a domain approaches a renewal window. The domain renewal checklist covers the operational review.

Auto-renewal uncertainty

Auto-renewal is helpful, but it is not a plan by itself. Agencies should not claim a domain is handled simply because someone believes auto-renewal is on.

Document:

  • Who confirmed auto-renewal.
  • Whether the payment method is current.
  • Who receives renewal notices.
  • What happens if payment fails.
  • Whether the client or agency owns the account.

CertPilot can help surface renewal windows and public risk signals. It does not auto-renew domains.

Client-owned vs agency-managed domains

| Ownership model | Benefit | Risk | Agency action | |---|---|---|---| | Client-owned registrar | Client retains direct asset control | Client may ignore renewal or DNS requests | Document contact and escalation path | | Agency-managed registrar | Agency has operational control | Ownership can blur during handover | Keep written ownership notes | | Third-party vendor-owned | Vendor handles renewal or DNS | Agency has limited visibility | Identify vendor and backup contact | | Registrar consolidation | Fewer providers to track | Migration can introduce DNS risk | Plan migration QA carefully |

The right model depends on the client relationship. What matters is that the model is written down and reviewed.

Domain handover workflows

Handover is where weak domain operations become visible. A good handover should include:

  • Domain list.
  • Registrar provider.
  • DNS provider.
  • Nameservers.
  • Renewal owner.
  • Public expiry signal if available.
  • Email/DNS dependencies.
  • SSL/certificate owner.
  • Known limitations.
  • Next renewal window.

For launch or provider moves, pair domain handover with the DNS migration QA checklist.

Multiple registrars and fragmented alerts

Agencies often inherit domains across GoDaddy, Namecheap, Cloudflare Registrar, Google Domains migrations, Squarespace, Network Solutions, Tucows resellers, and hosting-provider registrars. Fragmentation creates alert fatigue and blind spots.

The solution is not always consolidation. Consolidation can help, but it also creates migration work. The first step is visibility: list where each domain lives, who receives notices, and which domains need active follow-up.

Common failure patterns

| Failure pattern | Likely cause | Urgency | Next step | |---|---|---|---| | Domain near expiry and owner unknown | Registrar account not documented | High | Find client/vendor owner immediately | | Expiry date unavailable publicly | Registry or TLD limitation | Medium | Confirm in registrar account | | Nameservers changed unexpectedly | Registrar, DNS, or CDN move | High | Review DNS and email records | | Client thinks agency owns domain | Handover gap | Medium | Clarify ownership in writing | | Auto-renewal assumed but not confirmed | Payment/contact unknown | Medium | Confirm in registrar account | | SSL renewal blocked by DNS access | DNS owner not documented | High near expiry | Assign DNS owner |

How domain operations connect to SSL, DNS, email, and reports

Domains sit underneath other agency workflows:

  • SSL depends on domain routing, DNS, CAA, and validation.
  • DNS depends on nameserver authority and provider access.
  • Email authentication depends on MX and TXT records.
  • Client reporting depends on being able to explain ownership and risk.

That is why domain operations should link to monthly client domain health reports, agency client reporting, and DNS record inventory.

Client domain operations checklist

  • List every client domain and alias.
  • Record registrar and account owner.
  • Record DNS provider and nameservers.
  • Record renewal date when visible.
  • Confirm renewal owner.
  • Note whether auto-renewal is confirmed or unknown.
  • Document who receives registrar notices.
  • Record DNS access owner.
  • Link related SSL, DNS, and email-authentication notes.
  • Add handover notes for client-owned assets.
  • Review after registrar, hosting, DNS, or client ownership changes.
  • Include exceptions in the next client proof report.

Client-owned domain vs agency-managed domain vs registrar consolidation

Use this decision framework:

| Decision | Best when | Watch for | Agency posture | |---|---|---|---| | Client-owned domain | Client wants direct asset control | Slow response to renewal/DNS requests | Document owner and escalation path | | Agency-managed domain | Agency is contracted for operations | Handover and ownership clarity | Keep written agreement and records | | Registrar consolidation | Client has many scattered domains | Migration and DNS cutover risk | Inventory first, migrate carefully | | Leave as-is with monitoring | Domain ownership is stable | Fragmented alerts | Monitor and report exceptions |

How CertPilot fits

CertPilot helps agencies use public certificate, DNS, RDAP/domain, email-authentication, and trust-signal data to monitor client-domain risk and produce client-ready proof reports. It does not replace registrar alerts, renew domains, manage registrar accounts, or store registrant personal data as a system of record.

Use CertPilot this way:

Tool CTA: review client domains before they become urgent

Run the free 10-domain agency audit when you need a quick portfolio review across SSL, DNS, domain expiry, CAA, and email-authentication signals. Use the single-domain health check for one domain during onboarding, handover, or troubleshooting.

Cluster map: supporting domain operations resources

Frequently Asked Questions

What is a domain operations guide for agencies?

A domain operations guide for agencies is a practical workflow for tracking client domains, registrar ownership, renewal dates, DNS providers, nameservers, access, and handover notes. It helps agencies avoid treating domains as one-time launch details. Domains need recurring review because expiry, DNS ownership, SSL renewal, email routing, and client access can all affect website operations.

Should agencies own client domains?

Not always. Client ownership is often the cleanest asset-control model, especially for larger or more mature clients. Agency-managed ownership can work when it is clearly contracted and documented. The risky model is unclear ownership. Agencies should document who owns the registrar account, who pays for renewal, who receives notices, and who can act during an urgent change.

Can CertPilot auto-renew client domains?

No. CertPilot does not auto-renew domains and does not replace the registrar. It helps agencies monitor public domain, DNS, SSL, and related signals so renewal risk can be spotted and assigned. Actual renewal, billing, account recovery, and registrar changes remain with the registrar account owner.

Why is public expiry data sometimes missing?

Public expiry data can be missing or inconsistent because TLDs, registries, RDAP behavior, privacy rules, and registrar systems differ. Agencies should use public expiry data as a monitoring signal, not as the only source of truth. The registrar account should still be checked for renewal settings, payment status, and account contact details.

How often should agencies review domain operations?

Review domain operations during onboarding, handover, renewal windows, registrar changes, DNS migrations, and quarterly care-plan reviews. High-value domains and domains with unclear ownership should be reviewed more often. Monthly reporting can mention that domain signals were checked and identify any missing owner, missing expiry visibility, or due-soon renewal.

What belongs in a client domain handover?

A domain handover should include the domain list, registrar, DNS provider, nameservers, renewal owner, DNS owner, public expiry signal if available, known SSL dependencies, email-routing notes, and current limitations. It should also clarify whether the agency, client, or vendor is responsible for renewal and DNS changes after handover.

How does domain operations connect to agency reporting?

Domain operations gives agency reporting concrete proof items. Instead of saying "we monitor your site," the agency can show that domain expiry, DNS authority, SSL dependencies, and ownership notes were reviewed. This makes invisible operational work clearer without overwhelming the client with raw RDAP or DNS output.

Monitor every client domain from one dashboard.

CertPilot checks SSL expiry, DNS records, and domain registration daily — then sends one alert when action is needed. 14-day free trial, no card required.