Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.

Answer Posted / amit

4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)

Password Rules
8 char > 40 char
case insensitive > case sensitive

Various new authorisation objects created. (SAP_NEW - Profile)

Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Can you explain network topology in sap systems?

1177


how we can see FFID if firefighter not able to see FFids ?

2095


Is it possible to change role template? How?

1307


Differentiate between temp role and copy role

1256


How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.

1446


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1229


What does the account assessment category specify in a purchasing document in SAP Materials Management?

1426


What is the use of tmssup* rfc destinations?

2691


What is sap cryptographic library?

1120


What does the profile generator do?

1177


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1107


what is the different b/w su10 and su12

3029


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

2429


Can you explain secure store and forward?

1118


User is not there in User master record. Then how to trace the user?

1515