Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.

Answer Posted / amit

4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)

Password Rules
8 char > 40 char
case insensitive > case sensitive

Various new authorisation objects created. (SAP_NEW - Profile)

Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between c (check) and u (unmaintained)?

1066


Pfcg proposed activities but you need only two. What would you do?

662


what is centralize FFID?

1526


Differentiate between usobx_c and usobt_c

623


how we do CUA configuration in Quality system

1973






What does the pfcg_time_dependency clean up?

800


Any details about secatt apart from SAPSecurity online.com?

1904


What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?

630


When would you update a sap table directly? What precautions would you taje?

722


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1695


What is the difference between authorization object and authorization object class?

644


Can you explain secure store and forward?

615


How do you check background jobs?

734


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3041


Explain snc in sap security?

698