Answer Posted / giridhar
Dialog user 'A'
Individual system access (personalized)
Logon with SAPGUI is possible. The user is therefore
interaction-capable with the SAPGUI.
Expired or initial passwords are checked.
Users have the option of changing their own passwords.
Multiple logon is checked.
Usage: For individual human users (also Internet users)
System user 'B'
System-dependent and system-internal operations
Logon with SAPGUI is not possible. The user is therefore
not interaction-capable with the SAPGUI.
The passwords are not subject to to the password change
requirement, that is, they cannot be initial or expired.
Only an administrator user can change the password.
Multiple logon is permitted.
Usage: Internal RFC, background processing, external RFC
(for example, ALE, workflow, TMS, CUA)
Communication user 'C'
Individual system access (personalized)
Logon with SAPGUI is not possible. The user is therefore
not interaction-capable with the SAPGUI.
Expired or initial passwords are checked but the conversion
of the password change requirement that applies in
principle to all users depends on the caller
(interactive/not interactive). (*)
Users have the option of changing their own passwords.
Usage: external RFC (individual human users)
Service user 'S'
Shared system access (anonymous)
Logon with SAPGUI is possible. The user is therefore
interaction-capable with the SAPGUI.
The passwords are not subject to the password change
requirement, that is, they cannot be initial or expired.
Only a user administrator can change the password.
Multiple logon is permitted.
Usage: Anonymous system access (for example, public Web
services)
Reference user 'L'
Authorization enhancement
No logon possible.
Reference users are used for authorization assignment to
other users.
Usage: Internet users with identical authorizations
Is This Answer Correct ? | 45 Yes | 2 No |
Post New Answer View All Answers
Differentiate between usobx_c and usobt_c
What is sap’s grc?
What authorization are required to create and maintain user master records?
How to insert missing authorization?
What are the most used tables in sap?
Differentiate between derived role and composite role
What is use of derived roles?
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
What is the difference between c (check) and u (unmaintained)?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
You want to create and maintain user master record. What authorization would you need?
In pfcg where we can add customized t-codes. And where we can see customized t-codes
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
What is audit information system?
How do we test security systems.