Difference between 4.7c and ECC 6.0 in security aspect? I
tried in many website but still not able to find the correct
one.

Answer Posted / amit

4.7 > Based on WebAS 6.2
ECC6 > Based on NW7 (Addition of Java Stack)

Password Rules
8 char > 40 char
case insensitive > case sensitive

Various new authorisation objects created. (SAP_NEW - Profile)

Many changes in transactions :
RSSM > RSECADMIN
Se16(N) - N transaction codes

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What does the item category specify in a purchasing order in SAP Materials Management?

904


What are su53 t-codes used for?

823


How we schedule and administering background jobs?

657


Explain internet-level security?

632


Hi I' m Len  Am looking for sap grc training in bangalore . Let know any  institute or any who teach

1612






You want to create and maintain user master record. What authorization would you need?

720


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1695


Can you explain document transfer-level security?

665


What authorization are required to create and maintain user master records?

666


When would you update a sap table directly? What precautions would you taje?

722


Explain secure store and forward?

618


User is not there in User master record. Then how to trace the user?

977


Differentiate between saml token profile and a sap logon ticket

848


Which transaction code is used to display the user buffer?

665


What is Sap security t-codes?

714