Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.

Answer Posted / amit

4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)

Password Rules
8 char > 40 char
case insensitive > case sensitive

Various new authorisation objects created. (SAP_NEW - Profile)

Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the use of su56?

1139


What is sap cryptographic library?

1066


What are some ap security t codes?

1164


What authorization are required to create and maintain user master records?

1127


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2341


what is the difference between usobt_c and usobx_c?

1348


what is the different b/w su10 and su12

2985


What is Sap security t-codes?

1218


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2719


Can you explain snc in sap security?

1166


could anyone tell me how we can copy the mass roles from sap_all profiles???????

2145


Attributes in SE01?

2543


Can you explain protecting public keys?

1063


what is the process to find that one consultant had removed a table from sap tables

2535


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2584