Answer Posted / giridhar
Dialog user 'A'
Individual system access (personalized)
Logon with SAPGUI is possible. The user is therefore
interaction-capable with the SAPGUI.
Expired or initial passwords are checked.
Users have the option of changing their own passwords.
Multiple logon is checked.
Usage: For individual human users (also Internet users)
System user 'B'
System-dependent and system-internal operations
Logon with SAPGUI is not possible. The user is therefore
not interaction-capable with the SAPGUI.
The passwords are not subject to to the password change
requirement, that is, they cannot be initial or expired.
Only an administrator user can change the password.
Multiple logon is permitted.
Usage: Internal RFC, background processing, external RFC
(for example, ALE, workflow, TMS, CUA)
Communication user 'C'
Individual system access (personalized)
Logon with SAPGUI is not possible. The user is therefore
not interaction-capable with the SAPGUI.
Expired or initial passwords are checked but the conversion
of the password change requirement that applies in
principle to all users depends on the caller
(interactive/not interactive). (*)
Users have the option of changing their own passwords.
Usage: external RFC (individual human users)
Service user 'S'
Shared system access (anonymous)
Logon with SAPGUI is possible. The user is therefore
interaction-capable with the SAPGUI.
The passwords are not subject to the password change
requirement, that is, they cannot be initial or expired.
Only a user administrator can change the password.
Multiple logon is permitted.
Usage: Anonymous system access (for example, public Web
services)
Reference user 'L'
Authorization enhancement
No logon possible.
Reference users are used for authorization assignment to
other users.
Usage: Internet users with identical authorizations
| Is This Answer Correct ? | 45 Yes | 2 No |
Post New Answer View All Answers
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
What are the most used tables in sap?
Explain protecting public keys?
what things you have to take care before executing run system trace?
How we Provided Security design, configuration, and support for SAP Enterprise Portals
what is use of copy data in derived role and when we use this one ???
By which parameter number of entries are controlled in the user buffer?
what are all the questions covered in "profiles related concepts " please let me know ?
what is the difference between usobt_c and usobx_c?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
How to do Role Design, Testing and Implementation
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
What are su25 t-codes used for?
what is user buffer?
Is it possible to change role template? How?