Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answer Posted / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What is the use of su56?
What is sap cryptographic library?
What are some ap security t codes?
What authorization are required to create and maintain user master records?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
what is the difference between usobt_c and usobx_c?
what is the different b/w su10 and su12
What is Sap security t-codes?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
Can you explain snc in sap security?
could anyone tell me how we can copy the mass roles from sap_all profiles???????
Attributes in SE01?
Can you explain protecting public keys?
what is the process to find that one consultant had removed a table from sap tables
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.