Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.
Answer Posted / amit
4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)
Password Rules
8 char > 40 char
case insensitive > case sensitive
Various new authorisation objects created. (SAP_NEW - Profile)
Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What does the item category specify in a purchasing order in SAP Materials Management?
What are su53 t-codes used for?
How we schedule and administering background jobs?
Explain internet-level security?
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
You want to create and maintain user master record. What authorization would you need?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Can you explain document transfer-level security?
What authorization are required to create and maintain user master records?
When would you update a sap table directly? What precautions would you taje?
Explain secure store and forward?
User is not there in User master record. Then how to trace the user?
Differentiate between saml token profile and a sap logon ticket
Which transaction code is used to display the user buffer?
What is Sap security t-codes?