Answer Posted / dvr reddy
They are 5 users
1. Dialog user:
this is the user who communicate with system interactively
2. Communication User:
it is an RFC user to communicate between two systems.
ex:ALE remote and BW remote users r used to communicate
between R/3 and BW systems
3. System User:
It is used to communicate with in the system
Ex: RFC user to communicate between with in the same system
4. Service User:
It is enormous user which is used to by agroup of users
Ex:DDIC is a service user
5. Reference User:
This is used to provide additional writes to the users.there
are also used to refer & provide additional writes to the
Internet users
Is This Answer Correct ? | 5 Yes | 2 No |
Post New Answer View All Answers
What are pfud t-codes used for?
How to insert missing authorization?
What are the different types of sap security tables?
Why is it important to delete sap-new profile? What steps will you take to do this?
Which tables will you use for making customizing setting for security administration?
What does user compare do?
What is the difference between authorization object and authorization object class?
how do i go on about Developing,maintaining,and implementing a mitigating control strategy and provide SAP authorisations support to users? Please help
How do we test security systems.
what is authorization object and authorization object class?
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Which t-code can be used to delete old security audit logs?
What is a composite role?
What does the pfcg_time_dependency clean up?
Differentiate between usobx_c and usobt_c