Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answer Posted / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
Attributes in SE01?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.
Is it possible to change role template? How?
Explain secure store and forward?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
Which transaction code is used to display the user buffer?
How to run the daily background job s for virsa violations ? thabks in advance
What is a composite role?
what is the use of defaults tab in start menu
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
What does the account assessment category specify in a purchasing document in SAP Materials Management?
what is the difference between usobt_c and usobx_c?