Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answer Posted / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
what is authorization object and authorization object class?
User is not there in User master record. Then how to trace the user?
List the various user types.
Can you explain transport system-level security?
What is t code?
explain the personalization tab within a role?
what is user base in sap security?
what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?
Differentiate between saml token profile and a sap logon ticket
Can you explain document transfer-level security?
What are st01 t-codes used for?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
What is sap internet transaction server?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this