UUID/GUID Generator

UUID Version Selection
Generated UUIDs
UUID Decoder & Validator
UUID Version Info
Version 4 - Random

Randomly generated UUID with 122 bits of randomness. Most commonly used version for general purposes.

UUID Structure

Standard UUID format:

xxxxxxxx-xxxx-Mxxx-Nxxx-xxxxxxxxxxxx
  • M: Version digit (1-7)
  • N: Variant bits (8, 9, A, or B)
  • Total: 128 bits / 32 hex digits
Common Use Cases
  • 🗄️ Database Primary Keys
  • 📡 API Resource IDs
  • 🔗 Unique Identifiers
  • 📊 Distributed Systems
  • 🔄 Message IDs
Quick Actions

Free Online UUID v2 Generator - DCE Security Tool

Generate UUID v2 online for free. This browser-based DCE Security UUID tool embeds POSIX UID/GID - no installation required. Useful for legacy DCE systems.

When to Use This Version

UUID v2 is mainly relevant for legacy DCE systems or specialized Unix authentication scenarios. For most modern applications, v4 (random) or v7 (time-based) are better choices. V2 sacrifices timestamp precision for embedded UID/GID, which is rarely a useful trade-off today.

Best Practices

Unless you're maintaining legacy DCE-compatible systems, avoid v2. The reduced timestamp precision and obscure use case make it unsuitable for general-purpose applications. Use v4 for random IDs or v7 for time-sortable IDs instead.

Compare with Other Versions

UUID Version 2 Questions

UUID v2 (DCE Security) is a variant of v1 that replaces part of the timestamp with a local domain identifier and POSIX UID or GID. It was designed for DCE (Distributed Computing Environment) security purposes.

Probably not. V2 is rarely used outside legacy DCE systems. It has worse timestamp precision than v1 and limited practical applications. For most use cases, v4 or v7 are better choices.

Three domains are defined: 0 = Person (POSIX UID), 1 = Group (POSIX GID), 2 = Organization. The domain specifies what the embedded local ID represents.

DCE never gained widespread adoption. V2 sacrifices timestamp precision for embedded Unix user/group IDs - a trade-off that's rarely useful outside specific authentication scenarios.