Solved

Max length of MS Exchange Userid

Posted on 2004-08-16
6
319 Views
Last Modified: 2010-04-12
My Network Administrator claims that a USERID > 18 bytes "causes trouble" but he does no elaborate.  We use firstname.lastname for USERID and 18 bytes is not long enough for some users.

So my question:  What is the maximum length of an MS Exchange 2000 USERID and where is this documented?

Thanks,
/RockFox
0
Comment
Question by:RockFox
  • 4
  • 2
6 Comments
 
LVL 9

Accepted Solution

by:
jdeclue earned 125 total points
ID: 11813392
I assume you are referring to the users email address as opposed to the User Account, in Active Directory that a user has to log in to the network and Exchange Servers. Is that correct?

If that is, then the question is "How long can an email address be?"

Here is the answer

Section 4.3.5.1 of RFC 2821 states that the maximum length of any SMTP command is 512 bytes, including the CRLF at the end of the command.

Since an recipient's address is specified by the "RCPT TO:" command:

RCPT TO: <foo@bar.baz>CRLF
                       
So theoretically the maximum length of an SMTP address should be 499 bytes (or characters).



0
 
LVL 9

Expert Comment

by:jdeclue
ID: 11813499
Oh yeah... and if it is the Windows 2000 account, which often has the email associated directly with it, the maximum for AD is 57 characters. I think that is an arbitrary number on Microsoft's behalf.

J
0
 

Author Comment

by:RockFox
ID: 11819957
Yes, I'm inquiring on maximum length of a network login name in Active Directory.  I like you answer of 57 bytes.  Can you tell me where it is documented?

/RockFox
0
Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

 
LVL 9

Expert Comment

by:jdeclue
ID: 11820072
I couldn't find it documented, so I created a user account, opened up ADSI Edit and and made a bogus name, until it wouldn't take any more characters. I then saved the account and logged in with it, to make sure it worked. Then I counted the characters;) Thats why there was 3 minutes between my two posts. Pretty anal, huh!

J
0
 

Author Comment

by:RockFox
ID: 11824288
No, that's not anal.  I probably would have done something similar if I had the priviledges.

I was hoping that I could point the Network Administrator to a Micorsoft document.  

I am an IBM mainframe Systems Programmer (VM and VSE for 41 years)  so  of course a M$ admin wouldn't believe me if I told him the time-of-day without  documentation.

Thank you much for you response.

/RockFox
0
 
LVL 9

Expert Comment

by:jdeclue
ID: 11824315
Hah.... I hear ya.. I am a Microsoft guy,.... but I used to work for First Union, spent most of my time working with MQSeries to Unix and Microsoft platforms... spent a lot of time with guys!

J
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question