Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answer Posted / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Is it possible to have more than one st of org-level values in one role? Explain your answer.
How to codify for an Item in SAP? How many digits are required for an item?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
What is the difference between c (check) and u (unmaintained)?
Is it possible to change role template? How?
What is stad?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
What are su25 t-codes used for?
What does the profile generator do?
Explain secure store and forward?
what is the main difference between the derived role and a single role?
What is a composite role?
explain the personalization tab within a role?
Explain sap system transactions?