what are various user types
Answers were Sorted based on User's Feedback
Answer / tapan
dialog, reference, communication, services, system
Is This Answer Correct ? | 49 Yes | 0 No |
Answer / giridhar
Dialog user 'A'
Individual system access (personalized)
Logon with SAPGUI is possible. The user is therefore
interaction-capable with the SAPGUI.
Expired or initial passwords are checked.
Users have the option of changing their own passwords.
Multiple logon is checked.
Usage: For individual human users (also Internet users)
System user 'B'
System-dependent and system-internal operations
Logon with SAPGUI is not possible. The user is therefore
not interaction-capable with the SAPGUI.
The passwords are not subject to to the password change
requirement, that is, they cannot be initial or expired.
Only an administrator user can change the password.
Multiple logon is permitted.
Usage: Internal RFC, background processing, external RFC
(for example, ALE, workflow, TMS, CUA)
Communication user 'C'
Individual system access (personalized)
Logon with SAPGUI is not possible. The user is therefore
not interaction-capable with the SAPGUI.
Expired or initial passwords are checked but the conversion
of the password change requirement that applies in
principle to all users depends on the caller
(interactive/not interactive). (*)
Users have the option of changing their own passwords.
Usage: external RFC (individual human users)
Service user 'S'
Shared system access (anonymous)
Logon with SAPGUI is possible. The user is therefore
interaction-capable with the SAPGUI.
The passwords are not subject to the password change
requirement, that is, they cannot be initial or expired.
Only a user administrator can change the password.
Multiple logon is permitted.
Usage: Anonymous system access (for example, public Web
services)
Reference user 'L'
Authorization enhancement
No logon possible.
Reference users are used for authorization assignment to
other users.
Usage: Internet users with identical authorizations
Is This Answer Correct ? | 45 Yes | 2 No |
Answer / kishore kumar vuthpala
Dialog (A)
System (B)
Communication (C)
Service (S)
Reference (L)
Is This Answer Correct ? | 23 Yes | 0 No |
Answer / dvr reddy
They are 5 users
1. Dialog user:
this is the user who communicate with system interactively
2. Communication User:
it is an RFC user to communicate between two systems.
ex:ALE remote and BW remote users r used to communicate
between R/3 and BW systems
3. System User:
It is used to communicate with in the system
Ex: RFC user to communicate between with in the same system
4. Service User:
It is enormous user which is used to by agroup of users
Ex:DDIC is a service user
5. Reference User:
This is used to provide additional writes to the users.there
are also used to refer & provide additional writes to the
Internet users
Is This Answer Correct ? | 5 Yes | 2 No |
Answer / amitesh
dialog user,reference user,communication user,service user,system user.Most of the tickets will get for dialog user in the project
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / syed mahboob feroz ahmed
Hi,
We have Single User and Mass Users.Where Single User
contains whole User Information and Mass Users contain only
user information.
Is This Answer Correct ? | 0 Yes | 24 No |
Answer / knreddy
dilog user, syste user, trns por use, like that 5 type of
users
Is This Answer Correct ? | 0 Yes | 30 No |
How to add a new tcode to 1000 roles at a time?
2 Answers Cap Gemini, Tech Mahindra,
User done tasks with ffid n logged off but controller not get any log reports,why?
what is the difference between user buffer and user contex?
You want to remove a developer's and developer keys from a system. How would you do that?
What is fire fighter ? When we are using fire fighter?
How would you do the 'lock all users at once'.
what is the landscape of GRC
Difference between short and Long Description in PFCG?
How will you mitigate a user against an authorization object which is decided as sensitive by Business
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar
How to trace the Users in BI Security and give me navigation
What is the difference between authorization object and authorization object class?