Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answer Posted / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
what are all the questions covered in "profiles related concepts " please let me know ?
HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER
What is the use of tmssup* rfc destinations?
What are su53 t-codes used for?
Explain protecting public keys?
Differentiate between temp role and copy role
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
How to find ECC system, GRC system and BI system ?
what things you have to take care before executing run system trace?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
What are su25 t-codes used for?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
how to do Restricting nodes and Hierarchies through characteristic values and authorization objects
Can you explain document transfer-level security?
How can sap security be improved?