Answer Posted / dvr reddy
They are 5 users
1. Dialog user:
this is the user who communicate with system interactively
2. Communication User:
it is an RFC user to communicate between two systems.
ex:ALE remote and BW remote users r used to communicate
between R/3 and BW systems
3. System User:
It is used to communicate with in the system
Ex: RFC user to communicate between with in the same system
4. Service User:
It is enormous user which is used to by agroup of users
Ex:DDIC is a service user
5. Reference User:
This is used to provide additional writes to the users.there
are also used to refer & provide additional writes to the
Internet users
| Is This Answer Correct ? | 5 Yes | 2 No |
Post New Answer View All Answers
Hi I' m Len Am looking for sap grc training in bangalore . Let know any institute or any who teach
What is the difference between role and a profile?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
How to do Role Design, Testing and Implementation
how to do Reporting and Analysis authorizations
How to update risk id in rule set?
What is the procedure for role modifications?
What are su25 t-codes used for?
What is the use of Personalization tab in SU01?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Support types of WOs you have faced?
What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects
What are su56 t-codes used for?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
What are the different types of sap security tables?