Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answers were Sorted based on User's Feedback
Answer / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
Is This Answer Correct ? | 0 Yes | 0 No |
what difference of the autherisations on change and expert
Is it possible to assign two roles with different validity period to a user in one shot through GRC? If yes, how
What is difference between two sentences 1: " Using SUGR we allocate user to group ". 2: " In SU01 in Logon data we assign user to group " So, What is assigning and allocating ?
Which t-code can be used to delete old security audit logs?
Mention which t-codes are used to see the summary of the authorization object and profile details?
what is role designing
Whay can't you assign a composite role to another composite role ? Need clear explaintion.
How will remove all expired role assignments to number of users ?
I want to see list of roles assigned to 10 different users.how do you do it?
How will you mitigate a user against an authorization object which is decided as sensitive by Business
What are the authorization objects which are always present in user master record?
What is the difference between usobx_c and usobt_c?