Answer Posted / giridhar
Dialog user 'A'
Individual system access (personalized)
Logon with SAPGUI is possible. The user is therefore
interaction-capable with the SAPGUI.
Expired or initial passwords are checked.
Users have the option of changing their own passwords.
Multiple logon is checked.
Usage: For individual human users (also Internet users)
System user 'B'
System-dependent and system-internal operations
Logon with SAPGUI is not possible. The user is therefore
not interaction-capable with the SAPGUI.
The passwords are not subject to to the password change
requirement, that is, they cannot be initial or expired.
Only an administrator user can change the password.
Multiple logon is permitted.
Usage: Internal RFC, background processing, external RFC
(for example, ALE, workflow, TMS, CUA)
Communication user 'C'
Individual system access (personalized)
Logon with SAPGUI is not possible. The user is therefore
not interaction-capable with the SAPGUI.
Expired or initial passwords are checked but the conversion
of the password change requirement that applies in
principle to all users depends on the caller
(interactive/not interactive). (*)
Users have the option of changing their own passwords.
Usage: external RFC (individual human users)
Service user 'S'
Shared system access (anonymous)
Logon with SAPGUI is possible. The user is therefore
interaction-capable with the SAPGUI.
The passwords are not subject to the password change
requirement, that is, they cannot be initial or expired.
Only a user administrator can change the password.
Multiple logon is permitted.
Usage: Anonymous system access (for example, public Web
services)
Reference user 'L'
Authorization enhancement
No logon possible.
Reference users are used for authorization assignment to
other users.
Usage: Internet users with identical authorizations
| Is This Answer Correct ? | 45 Yes | 2 No |
Post New Answer View All Answers
How to codify for an Item in SAP? How many digits are required for an item?
what is the use of defaults tab in start menu
How to find ECC system, GRC system and BI system ?
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE
what is sod in sap security?
What are the upgrades happened in GRC 5.3 from GRC 5.2?
Is it possible to have more than one st of org-level values in one role? Explain your answer.
what are all the questions covered in "profiles related concepts " please let me know ?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Can you explain document transfer-level security?
What are se10 t-codes used for?
Differentiate between usobx_c and usobt_c
What is the difference between authorization object and authorization object class?
What are su53 t-codes used for?
What is the main purpose of parameters, groups & personalization tabs?