Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.

Answer Posted / amit

4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)

Password Rules
8 char > 40 char
case insensitive > case sensitive

Various new authorisation objects created. (SAP_NEW - Profile)

Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what is centralize FFID?

2089


What is the difference between usobx_c and usobt_c?

1075


Can wildcards be used in authorizations?

1199


Explain sap system transactions?

1172


How we schedule and administering background jobs?

1126


the company needs to expand its region to another country which the same authorizations had previously what approach you will take

2366


User is not there in User master record. Then how to trace the user?

1470


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2448


how we Set up Central User Administration (CUA) to manage 4 systems/clients

2297


How to create users?

1213


How we Provided Security design, configuration, and support for SAP Enterprise Portals

2234


How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.

1375


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2131


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7171


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1045