Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.

Answer Posted / amit

4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)

Password Rules
8 char > 40 char
case insensitive > case sensitive

Various new authorisation objects created. (SAP_NEW - Profile)

Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what are all the questions covered in "profiles related concepts " please let me know ?

2164


HI FRIENDS..... CAN ANY ONE GIVE BRIEF EXPLAIN ABOUT PAM & QUICK SIZER

2136


What is the use of tmssup* rfc destinations?

2689


What are su53 t-codes used for?

1433


Explain protecting public keys?

1339


Differentiate between temp role and copy role

1252


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2761


How to find ECC system, GRC system and BI system ?

1273


what things you have to take care before executing run system trace?

1314


Is it possible to have more than one st of org-level values in one role? Explain your answer.

1148


What are su25 t-codes used for?

1287


What are the upgrades happened in GRC 5.3 from GRC 5.2?

4258


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2407


Can you explain document transfer-level security?

1202


How can sap security be improved?

1173