Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answer Posted / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What is the difference between c (check) and u (unmaintained)?
Pfcg proposed activities but you need only two. What would you do?
what is centralize FFID?
Differentiate between usobx_c and usobt_c
how we do CUA configuration in Quality system
What does the pfcg_time_dependency clean up?
Any details about secatt apart from SAPSecurity online.com?
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
When would you update a sap table directly? What precautions would you taje?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What is the difference between authorization object and authorization object class?
Can you explain secure store and forward?
How do you check background jobs?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Explain snc in sap security?