Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answer Posted / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
Can you explain network topology in sap systems?
how we can see FFID if firefighter not able to see FFids ?
Is it possible to change role template? How?
Differentiate between temp role and copy role
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
What is the use of tmssup* rfc destinations?
What is sap cryptographic library?
What does the profile generator do?
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
what is the different b/w su10 and su12
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Can you explain secure store and forward?
User is not there in User master record. Then how to trace the user?