Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answer Posted / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
what is the difference between usobt_c and usobx_c?
As a SAP security consultant what is the most challenged you faced in previous company?
What does the account assessment category specify in a purchasing document in SAP Materials Management?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
how we can see FFID if firefighter not able to see FFids ?
What does the account assessment category specify in a purchasing order in SAP Materials Management?
What is the difference between authorization object and authorization object class?
what is the process to find that one consultant had removed a table from sap tables
How we Provided Security design, configuration, and support for SAP Enterprise Portals
Is there a table for authorizations where I can quickly see the values entered in a group of fields?
What does the profile generator do?
Can you explain network topology in sap systems?
Authorization check on s_btch_job failed. What would happen now?
By which parameter number of entries are controlled in the user buffer?
what things you have to take care before executing run system trace?