All resources
Domain Operations

Domain Ownership Audit for Agencies: Who Controls the Client Domain?

A practical domain ownership audit guide for agencies reviewing who owns a client domain, who controls registrar access, who receives renewal notices, and what risk exists.

Updated 17 May 2026

See exactly where your client domains stand.

Run a free audit on up to 10 domains — SSL expiry, domain expiry, and DNS health in one report. No signup needed.

A domain ownership audit helps an agency identify who legally owns the domain, who has registrar access, who receives renewal and billing notices, who controls DNS, and what happens if the current owner or contact becomes unavailable. It is not the same as a public domain lookup. Public checks can show useful signals, but private registrar account details and legal ownership records still require client documentation and registrar access review.

For agencies, the practical question is simple: if the domain needs action today, who can act? Use the free 10-domain agency audit to review visible portfolio risk, use the single-domain health check when one domain needs a quick public review, and compare public-data boundaries against the CertPilot methodology.

Quick answer: domain ownership audit

A domain ownership audit is an operations review of control, accountability, and renewal risk. It should document:

  • The client entity or person that owns the domain.
  • The registrar account holder.
  • The people with registrar access.
  • The billing contact and payment owner.
  • The admin and technical contacts, where visible or documented.
  • The DNS provider and nameserver operator.
  • The renewal date, renewal workflow, and escalation owner.
  • The handover path if the agency, client, or previous vendor changes.

The audit should not rely only on public RDAP or WHOIS-style output. Public data can help confirm registrar, nameserver, and sometimes expiry signals, but registrant details may be redacted or unavailable depending on registry, registrar, TLD, and privacy rules. The audit becomes useful when it pairs public signals with client-approved documentation.

Why domain ownership is an agency operations issue

Domain ownership problems usually appear during a crisis. A client launches a new website, but no one can change nameservers. A domain approaches expiry, but renewal notices go to an old employee. Email records need to be updated, but the registrar login is tied to a former agency. The website is technically healthy, but the domain is operationally unmanaged.

Agencies often sit between the client, registrar, DNS provider, host, email platform, and previous vendors. That makes domain ownership an agency operations issue even when the agency does not own the domain. The agency needs a clear record of who can approve changes and who can perform them.

Treat domain ownership as a client asset-control workflow, not as a one-time onboarding question.

These roles are often confused:

| Ownership item | What to verify | Why it matters | Agency action | |---|---|---|---| | Legal domain owner | Client entity or person with ownership authority | Determines who can approve transfers, renewal responsibility, and recovery escalation | Ask client to confirm in writing and keep the note in internal records | | Registrar account holder | Account where the domain is registered | Determines who can renew, transfer, unlock, or update contacts | Identify the registrar and named account owner | | Registrar admin users | People who can log in | Determines speed of urgent action | Document current admins and recovery path | | Billing owner | Person or department responsible for payment | Prevents expiry caused by failed card or missed invoice | Confirm payment owner without storing card data | | Renewal notice recipient | Email address receiving renewal warnings | Prevents missed registrar messages | Confirm shared mailbox or responsible owner | | DNS operator | Provider controlling nameservers and records | Determines who can update website, email, and verification records | Record provider and access owner | | Technical contact | Person handling DNS, hosting, SSL, and email changes | Reduces handoff delay | Assign agency or client technical lead |

The legal owner may be the client. The registrar account holder may be a founder. DNS may be hosted at Cloudflare, the registrar, or a hosting platform. The agency may manage only part of the chain. The audit should make those boundaries explicit.

What agencies should document

Create one domain ownership record per production domain. For each domain, document:

  • Domain name.
  • Client name and owning legal entity.
  • Registrar.
  • Registrar account owner.
  • Known registrar admins.
  • MFA owner and recovery path.
  • Renewal date and data source.
  • Billing owner.
  • Renewal notice email.
  • DNS provider and nameservers.
  • Website host.
  • Email provider.
  • SSL or certificate workflow owner.
  • Emergency contact.
  • Last reviewed date.
  • Known uncertainties.

Do not store registrar passwords in a general project note or in CertPilot. Use a dedicated password manager and client-approved access process. The audit is about responsibility and visibility, not collecting secrets.

Registrar account access

Registrar access is the most important operational dependency. Without it, the agency may be unable to renew the domain, unlock it for transfer, update nameservers, update contacts, or review payment settings.

Confirm:

  • Who can log in today.
  • Whether MFA is enabled.
  • Who controls the MFA device or authenticator.
  • Whether recovery email and phone are current.
  • Whether access is client-owned, agency-managed, or previous-vendor controlled.
  • Whether there is an emergency escalation route.

If the agency should not hold registrar access, document that boundary clearly. If the client owns the account, the client still needs a named person who can act quickly.

Billing and renewal contact

Many expiry incidents are billing incidents. The domain may be set to auto-renew, but the payment method may fail, the billing email may be abandoned, or the renewal may require manual approval.

Document the billing owner and renewal notice recipient separately. A finance contact may receive invoices, while a technical contact receives operational alerts. Both matter.

Auto-renew is useful, but it is not a guarantee. Agencies should still verify the renewal date, payment owner, notification email, and recent registrar access during onboarding and periodic reviews.

Admin and technical contacts

Public registrant contact data may be redacted. That does not remove the need to document internal contacts.

Record:

  • Client executive or owner contact.
  • Client technical contact.
  • Agency account owner.
  • Agency technical owner.
  • Registrar account admin.
  • DNS admin.
  • Emergency approver.

The goal is not to expose personal data. The goal is to know who can approve and who can execute domain work.

DNS provider and nameserver control

Domain ownership and DNS control are related but different. A client may own the domain at one registrar while DNS records are hosted elsewhere. Nameserver access controls website routing, email authentication, MX records, CDN setup, verification TXT records, and SSL validation paths.

Pair this audit with DNS monitoring for agencies and DNS record inventory for agencies. A domain ownership audit answers "who controls the asset." A DNS inventory answers "what is currently configured."

Client-owned vs agency-managed domains

Client-owned domains are often best for long-term ownership clarity. Agency-managed domains can reduce operational friction but create handover risk if the client leaves.

Use a clear classification:

  • Client-owned and client-managed.
  • Client-owned and agency-assisted.
  • Client-owned but previous-vendor controlled.
  • Agency-owned on behalf of client.
  • Unknown ownership.

Unknown ownership should be treated as risk until resolved. It may not be urgent every day, but it becomes urgent when the domain is near expiry, during migration, or during client offboarding.

Red flags in a domain ownership audit

Escalate when you find:

  • Registrar unknown.
  • Registrar login unavailable.
  • MFA owned by a departed employee.
  • Renewal emails going to a personal mailbox.
  • Domain registered under a previous agency.
  • Client believes the agency owns the domain, but records are unclear.
  • Agency believes the client owns the domain, but no client contact can access it.
  • DNS provider unknown.
  • Nameservers point to a provider no one can access.
  • Renewal date is missing or public expiry data is unavailable.
  • Auto-renew is assumed but not verified inside the registrar account.

Each red flag needs an owner and next action. Do not leave the audit as a list of concerns.

Domain ownership audit checklist

  • Confirm the domain is in scope.
  • Identify the registrar.
  • Confirm the client ownership position.
  • Confirm registrar account holder.
  • Confirm registrar admins.
  • Confirm MFA and recovery ownership.
  • Confirm renewal date and confidence level.
  • Confirm billing owner.
  • Confirm renewal notice recipient.
  • Confirm DNS provider and nameservers.
  • Confirm website host.
  • Confirm email provider.
  • Confirm emergency contact.
  • Record unknowns.
  • Assign follow-up actions.
  • Review again after migration, handover, or ownership change.

What public checks can and cannot show

Public domain checks can help identify registrar, nameservers, DNS records, certificate signals, and sometimes expiry-related data. Availability varies by TLD, registrar, RDAP behavior, and public-data limitations. Public checks cannot reliably prove legal ownership, private registrar account access, payment method status, MFA ownership, or client approval authority.

That is why a domain ownership audit should combine visible signals with registrar access review and client documentation.

How CertPilot fits

CertPilot helps agencies track public domain, DNS, SSL, and renewal-risk signals and produce client-ready proof reports. It does not log in to registrar accounts, change DNS records, store registrant personal data, or replace registrar documentation.

Use CertPilot for portfolio visibility through the free agency audit, single-domain review through Health Check, and data-source context through the methodology page. Pair those checks with your internal ownership notes.

Frequently Asked Questions

What is a domain ownership audit?

A domain ownership audit is a structured review of who owns, controls, renews, and can recover a client domain. It documents the legal owner, registrar account holder, access owners, renewal contacts, billing responsibility, DNS provider, nameservers, and escalation path. For agencies, the audit prevents operational uncertainty when a domain is near expiry, needs migration, or must be handed over.

Can public domain data prove who legally owns a domain?

No. Public data can provide useful signals, but it may not prove legal ownership. Registrant data may be redacted or unavailable, and registrar account details are private. Agencies should use public checks as one input, then confirm ownership and authority through client documentation and registrar account review.

Should an agency own client domains?

Not by default. Some agencies manage domains for clients, but client-owned domains often reduce long-term ownership ambiguity. If the agency manages the domain, the agreement should state who owns it, who pays for renewal, and how handover works. The domain ownership audit should record that arrangement clearly.

How often should agencies review domain ownership?

Review ownership during onboarding, before website migration, before renewal windows, during care-plan setup, and before offboarding. For active client portfolios, a quarterly or semiannual review is reasonable, with more frequent review for high-value domains or accounts with unclear registrar access.

What should agencies avoid storing?

Agencies should avoid storing registrar passwords, payment card details, or unnecessary registrant personal data in general project notes. Use a dedicated password manager for credentials and keep the ownership audit focused on roles, providers, dates, approval paths, and unresolved risks.

How does CertPilot help with a domain ownership audit?

CertPilot helps with the visible side of the audit: public domain, DNS, SSL, and renewal-risk signals. It can help agencies spot issues earlier and produce client-ready proof reports. It does not replace registrar access review, client ownership documentation, or internal handover notes.

Monitor every client domain from one dashboard.

CertPilot checks SSL expiry, DNS records, and domain registration daily — then sends one alert when action is needed. 14-day free trial, no card required.