Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answers were Sorted based on User's Feedback
Answer / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
Is This Answer Correct ? | 0 Yes | 0 No |
What is sap’s grc?
What is the use of su56?
Mention different tabs available in pfcg?
some one broke the inheritance relationship b/w parent and child role,we want to know who broke the relationship.?
How can I find List of users in system who dont have any role assigned (Role Tab Blank) but created in system ?
Explain protecting public keys?
SU24 must be set up before implementing any roles. A. True B. False
Explain snc in sap security?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
In Agr_1251 we are able to see 100 roles but in SUIM we are able to see 120 roles what's the reason behind this ? why is the difference between the SUIM and the AGR table ?
how to adjust user master records?
How to codify for an Item in SAP? How many digits are required for an item?