136 private links
You may have came across this infographic being shared on various social media platforms. However, at face value and taken out of context, it can be considered misinformation — and I will explain why.
This is giving people an absolute false sense of security! It gets much more complicated than just a simple chart like this. This chart gives NO information on the contributing [critical] factors towards these calculations.
Rules exist for the naming of all database objects, user names, passwords, groups, files, and paths. Some of these rules are specific to the platform you are working on.
The character limitations provided here apply to the IBM® WebSphere® Portal administrator, IBM WebSphere Application Server administrator, database administrator, LDAP server administrator, and user IDs. Database and LDAP servers can have more restrictive limitations than provided here.