Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what are various user types

Answer Posted / giridhar

Dialog user 'A'
Individual system access (personalized)

Logon with SAPGUI is possible. The user is therefore
interaction-capable with the SAPGUI.
Expired or initial passwords are checked.
Users have the option of changing their own passwords.
Multiple logon is checked.
Usage: For individual human users (also Internet users)

System user 'B'
System-dependent and system-internal operations
Logon with SAPGUI is not possible. The user is therefore
not interaction-capable with the SAPGUI.
The passwords are not subject to to the password change
requirement, that is, they cannot be initial or expired.
Only an administrator user can change the password.
Multiple logon is permitted.
Usage: Internal RFC, background processing, external RFC
(for example, ALE, workflow, TMS, CUA)

Communication user 'C'
Individual system access (personalized)
Logon with SAPGUI is not possible. The user is therefore
not interaction-capable with the SAPGUI.
Expired or initial passwords are checked but the conversion
of the password change requirement that applies in
principle to all users depends on the caller
(interactive/not interactive). (*)
Users have the option of changing their own passwords.
Usage: external RFC (individual human users)

Service user 'S'
Shared system access (anonymous)
Logon with SAPGUI is possible. The user is therefore
interaction-capable with the SAPGUI.
The passwords are not subject to the password change
requirement, that is, they cannot be initial or expired.
Only a user administrator can change the password.
Multiple logon is permitted.
Usage: Anonymous system access (for example, public Web
services)

Reference user 'L'
Authorization enhancement
No logon possible.
Reference users are used for authorization assignment to
other users.
Usage: Internet users with identical authorizations

Is This Answer Correct ?    45 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain x-glueb and its use in sap security.

1357


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

3198


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2588


As a SAP security consultant what is the most challenged you faced in previous company?

1101


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2133


List the various user types.

1066


Which transaction should not be given to BASIS and DEV team in Production?

2513


You want to configure the local and global setting of cua. Where would you do that? What would happen if you have inconsistent settings?

1094


What authorization are required to create and maintain user master records?

1153


how we Set up Central User Administration (CUA) to manage 4 systems/clients

2304


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2811


what is the process to find that one consultant had removed a table from sap tables

2537


How can sap security be improved?

1122


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2341


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2647