Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answer Posted / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
How we schedule and administering background jobs?
Which transaction should not be given to BASIS and DEV team in Production?
What is use of derived roles?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
Pfcg proposed activities but you need only two. What would you do?
Differentiate between saml token profile and a sap logon ticket
How to find ECC system, GRC system and BI system ?
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
How to create users?
what is analysis authorization in sap bi and how to create analysis authorization in sap bi?
Explain internet-level security?
what is the different b/w su10 and su12
What is the procedure for role modifications?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?