Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answer Posted / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
what is centralize FFID?
What is the difference between usobx_c and usobt_c?
Can wildcards be used in authorizations?
Explain sap system transactions?
How we schedule and administering background jobs?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
User is not there in User master record. Then how to trace the user?
how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules
how we Set up Central User Administration (CUA) to manage 4 systems/clients
How to create users?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.
how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?