This site requires JavaScript to be enabled


Knowledge Home|Print
IT Help > User account management > What are Deakin's password requirements?
What are Deakin's password requirements?
Article: KB0010275 Published: 06-08-2013 Last modified: 13-08-2020

What are Deakin's password requirements?

For security reasons, your password must meet university requirements. The system will reject passwords that do not meet the specified criteria.

What is the password criteria?

Your password must:

  1. Consist of a minimum of eight, and a maximum of sixteen characters.
    A maximum password length is enforced to ensure compatibility with legacy systems
  2. Contain a combination of at least three of the following four character types:
    • Lowercase letters (a - z)
    • Uppercase letters (A - Z)
    • Numbers (0 - 9)
    • Symbols
  3. Your password must not contain three or more characters from your Deakin username.
  4. Your password must be different from your previous five passwords.

If you attempt to use a password you have used before, you will receive an error message that the password requirements criteria have not been met.


Known Limitations

While newer systems such as Single Sign On accept passwords of any length and combination of characters, some systems have limitations on the maximum password length and characters which can be used.
The following systems have known limitations:

  • Oracle Databases: Passwords must not exceed 30 characters.
  • SQL*Plus (Oracle Database Client): Password must not contain spaces, double quotes, @ or forward slash (/).


How can I remember my password but keep it secure?

The easiest way to remember a password and keep it secure is to pick a sentence that reminds you of the password. For example:

  • Hope my car gets through 2 semesters! (Hmcgt2s!)
  • What time is Class in room 9! (WtiCir9!)
  • I hope I remember my Deakin password! (IhIrmDp!)
  • i like my lucky Number #86 (ilmlN#86)

Expand/Collapse Comments
 Affected products:
Identity and Access Management (IAM)Identity and Access Management (IAM)
Was this helpful?
Rate this article