Skip to main content
Most data records in Narrative’s platform have one or more identifiers as attributes. Identifiers act as unique representations of underlying concepts—typically the device, browser, or user where data was collected. Since an identifier can represent different concepts, all identifiers include a type designation so you know what the identifier represents.

Why identifier types matter

When you query data, you need to know what kind of identifier you’re working with:
  • A cookie represents a browser session on a specific domain
  • A mobile ad ID represents a mobile device
  • A hashed email represents a person across devices
Understanding identifier types helps you:
  • Match data across the right dimensions
  • Estimate reach and overlap correctly
  • Apply appropriate privacy controls

Identifier categories

Mobile Ad IDs (MAIDs)

Mobile advertising identifiers are device-level identifiers provided by mobile operating systems. They’re accessible through platform APIs and persist until the user resets them.
PlatformID TypeFormat
Apple iOSidfaUppercase UUID: 918F1D4F-D195-4A8B-AF47-44683FE11DB9
Google Androidadid (also called GAID)Lowercase UUID: 3f097372-f01e-4b64-984c-395ae5828ee6
Mobile ad ID availability has decreased significantly due to privacy changes. Apple’s App Tracking Transparency (ATT) requires user opt-in, and many users decline.
Related: Mobile Ad IDs for a deeper dive into IDFA and GAID.

Cookies

When data is collected in a web browser context (desktop or mobile web), the identifier is typically a cookie. Cookies are storage mechanisms tied to a specific domain—a cookie set by one website cannot be read by another. Because cookies are domain-specific, Narrative doesn’t have a single “cookie” identifier type. Instead, each data provider has their own cookie namespace. Cookie identifiers are useful for:
  • Retargeting within a publisher’s properties
  • Frequency capping across a provider’s inventory
  • Cross-device matching when linked to other identifiers
Third-party cookies are being deprecated in major browsers. Chrome has announced plans to phase them out, and Safari and Firefox already block them by default.

Hashed Emails

Email addresses are personally identifiable information (PII) and cannot be shared in raw form. To enable matching while preserving privacy, emails are hashed using one-way cryptographic functions before being shared.
ID TypeHash AlgorithmOutput Length
md5_emailMD532 hex characters
sha1_emailSHA-140 hex characters
sha256_emailSHA-25664 hex characters
Important formatting rules:
  1. Convert to lowercase before hashing
  2. Remove leading/trailing whitespace
  3. Apply the hash algorithm
Email: [email protected]
Formatted: [email protected]
SHA-256: 06a240d11cc201676da976f7b49341181fd180da37cbe40a77432c0a366c80c3
Hashed emails are valuable because:
  • They persist across devices (people use the same email everywhere)
  • They’re deterministic (same email always produces the same hash)
  • They can’t be reversed to reveal the original email
Related: Data Pseudonymization for more on hashing techniques.

Hashed Phone Numbers

Similar to emails, phone numbers are hashed to enable matching while protecting PII.
ID TypeHash AlgorithmFormat
md5_phoneMD5E.164 format, then hash
sha1_phoneSHA-1E.164 format, then hash
sha256_phoneSHA-256E.164 format, then hash
Phone numbers should be normalized to E.164 format before hashing:
  • Include country code
  • Remove spaces, dashes, parentheses
  • Example: +14155551234

Universal IDs

Emerging universal identifier systems aim to provide privacy-preserving, cross-platform identity without relying on cookies or device IDs.
ID TypeDescription
uid2Unified ID 2.0 - generated from hashed emails, supports opt-out
rampidLiveRamp’s identity resolution identifier
id5ID5’s probabilistic and deterministic identity solution
Related: UID2 for details on Unified ID 2.0.

Choosing the right identifier type

Use CaseRecommended Identifier Types
Cross-device targetingHashed email, UID2
Mobile app targetingIDFA, GAID
Web retargetingFirst-party cookies, hashed email
Offline-to-online matchingHashed email, hashed phone
Privacy-first campaignsUID2, first-party data