Difference between Communication and System User

Hello All,
I would like to know the difference between the Communication User and System User.
Definition wise, Yes, I know what they are for?
But My doubt is, why do we need a communication user type for RFC connections when we can use a System user.
Why did SAP designed these two types of users?

It's okay in my books for people to experience the internet as it is and not the way it was individually intended
SU01Solution already solved the problem actually, but there are some very fine peripheral differences still between the user types.
That is why asking a specific question and discussing it's merits / pro's and con's is the best approach and SAP also benefits from it.
Another obvious difference if you do a simple search is that SYSTEM type users cannot issue SAP logon tickets.
There are a few more but as I said these are peripheral and very use-case dependent... so SU01Solution needs to ask a proper and realistic question.
ps: ST01 is not the answer here either...
Cheers,
Julius

Similar Messages

  • Difference between SYS and SYSTEM user

    Hi,
    Well, one of my colleagues have asked me the difference between SYS and SYSTEM user .. Normally these are the users which will be under the monitoring of the DBA .. So, how could I know the difference between these two users ..
    Please assist me
    Regards

    SYS is the owner of the database and the owner of the data dictionary.
    The objects belonging to SYS cannot be exported. But SYS has the SYSDBA privilege which SYSTEM doesn't.
    SYSTEM is a privileged administration user, and typically owns Oracle provided tables other than the dictionary.
    SYSDBA is not a role, it is a privilege. You'll find it in system_privilege_map, not in dba_roles.

  • Differences Between Object And System Privileges

    Hi,
    Whats the difference between object and system privileges in oracle?
    Cheers
    Paul

    System Privileges
    A system privilege is the right to perform a particular action, or to perform an action on any schema objects of a particular type. For example, the privileges to create tablespaces and to delete the rows of any table in a database are system privileges.
    Schema Object Privileges
    A schema object privilege is a privilege or right to perform a particular action on a specific schema object:
    For example, the privilege to delete rows from the departments table is an object privilege.
    Some schema objects, such as clusters, indexes, triggers, and database links, do not have associated object privileges. Their use is controlled with system privileges. For example, to alter a cluster, a user must own the cluster or have the ALTER ANY CLUSTER system privilege.
    A schema object and its synonym are equivalent with respect to privileges. That is, the object privileges granted for a table, view, sequence, procedure, function, or package apply whether referencing the base object by name or using a synonym.
    Granting object privileges on a table, view, sequence, procedure, function, or package to a synonym for the object has the same effect as if no synonym were used. When a synonym is dropped, all grants for the underlying schema object remain in effect, even if the privileges were granted by specifying the dropped synonym.

  • Difference between admin and normal user

    Hi Community,
    how does the user right management works when an admin account is used? In Mac OSX an admin isn't really an admin account  because the user become prompted for the (admin) user password again if he require higher privileges. Microsoft implemented since Windows Vista a similar technique, an administrator account works with a normal user token and if higher privileges are needed, the user will get the UAC dialog to grant higher privileges. This is done by providing the user an admin token temporarily.
    Is this the same way Mac OSX works or is this done by a different technique?
    Thx & Bye Tom

    Hi MrHoffman
    MrHoffman wrote:
    For further reading and improving your knowledge security beyond "root" and "sudo", there are Apple's security guides and the US NSA/CIA operating system security configuration guides.  Both of these resources are a little dated, but the underpinnings of the operating system and its security have not changed significantly; what you learn will still be valid, though there can be some features of newer releases (such as the profile manager, the lack of installed Java) that might be useful.
    Thanks a lot. The link  to the Mac OS security configuration guide seems to be broken but I took a short look into the Linux guide and this is also very interesting, even if I'm not using Redhat but Debian.
    MrHoffman wrote:
    Wo ist die Diskussion, bitte?
    In de.comp.sys.mac.misc but only one posing is interesting:
    Message-ID: <[email protected]>
    And there is only the problem addressed about the difference between an users login shell and an interactive sub shell and how it could be used for privilege escalation by modifying the $PATH variable to execute malicious code with root privileges. I remember this on earlier days in Linux when the actual directory (.) was at the end of the $PATH variable. This could end in the same issue after all.
    Thx & Bye Tom

  • Difference between Dialog and Background User

    Dear Sap Gurus,
    What is the difference between a Dialog user and a Background user. I have asked a specific role to be assigned to Auditors, but the consultants have said that they cannot grant that role because it will give access  to very sensitive data. They in turn suggested that they will create a background user with that role. 
    what is the  difference between a dialog user and a backgroud user and how it relates to sensitivity of data ?
    Thanks in advance,
    Diwakar

    Dialog user type is your "typical" user type for people who log in to SAP & use it in their day to day work.
    Background user is used to schedule batch & background jobs and basically run stuff in the background (hence the name).  The most important thing to know is that you cannot login with a Background user which renders the recommendation of your consultant rather irrelevant and given the required use of it, a demonstration that they may not quite know as much as they profess to do. 
    Each user type can only do what is defined by it's roles (in most cases).  If a role assigned to a dialog user gives access to very sensitive data then it will give the same access to a background user and this is not too hard to exploit.
    Furthermore, it is usually expected for auditors to have access to sensitive data (depending on what they are auditing) however they should only be displaying this data.  They need no change access, and should not be requesting it, a wide access display role covering functional & technical display roles & access to display table data should suffice for 99% of audits.  If someone suggests that this access can only be assigned to a background role then I am surprised unless there are some very specific circumstances.

  • Difference between HFM and Essbase user security in 9.3.1 version

    Hi,
    Could any one explain the differences between Hyperion Essbase and HFM security setup using HSS in 9.3.1
    Thanks
    Edited by: user10305642 on Jul 13, 2009 12:39 AM

    HFM and Essbase security is totally different... HFM uses security classes while Essbase uses security filters.
    The way you assign security is also different.
    HFM also has more roles than Essbase.
    You will find further info in the Security Administration Guide:
    http://download.oracle.com/docs/cd/E10530_01/doc/epm.931/hyp_security_guide.pdf
    Hiope this helps,
    Seb

  • Difference Between Physical and System Stock.

    Hi Gurus,
    I am facing a problem in Executing One Scenario.
    Actually we have one Raw Material which contains a "Moisture Contain" Half it own weight.
    When we are procuring it, we do it as it is i.e. including the weight of Moisture.
    But when we are issuing it for production the scenario is like,
    Suppose we require 10 Kg of that Raw Material for 5 Kg of finished product.
    Physically we are Isuuing 10 Kg, But in system we are Issuing it as 5 Kg only (i.e "Excluding the Moisture Content of 5 Kg").
    But beacuse of this there is a variation in Physical and System Stock.
    How to aviod this Variation in Stock?
    Please Help.........
    Thanks in Advance.

    HI
    Maintain the moisture content in Component scrap in MRP4 and do all the calculation on dry basis only for FG.
    also while procuring the item system will calculate PR qty including the moisture content.
    Check with your MM consultant.
    Regards
    Anupam Sharma

  • SAP Kernel release - Difference between SM51 and System- Status ?

    Dear SDN colleagues,
    I am a ABAP developer, and have been told by our Basis department that our SAP Kernel is 640.
    When I check the following, I get different values:
    1) System -> Status : SAP_BASIS is 620
    2) Transaction SM51 -> Release Notes: I see SAP R/3 Kernel              640_REL
    Can anyone explain why there is a difference in these informations? (and which is the correct one !)
    Thanks in advance.
    Best regards,
    Jodie

    Hello Jodie,
    First of all there is nothing to be "implemented" as per the note.
    Additionally the poor basis guy is saying the correct thing. Check this part:
    Solution
    The changes are activated with the following patch levels:
    4.6D : 1495
    6.20 : 764
    The paging administration was enhanced.
    The error is no longer passed on to other sessions and the trace outputs to determine the error cause have been improved.
    The patch levels mentioned are kernel patch levels and have nothing to do with your SAP_BASIS release.Since your kernel is 640 this note is no longer applicable.  In my opinion you need to dig for some other note.
    Regards.
    Ruchit.

  • Difference between UME and LDAP users

    Hi,
    I am facing a strange problem. In my Webdynpro application, I am accessing the portal user properties using the normal user management APIs. IUser object. On my local server, all the users are UME users and it runs fine.
    When I deployed my application on the central server which creates LDAP users by default, the code bombs saying the user is not authorized. When I recreate the user in UME, it is fine again. Are there APIs which I can use which work for both the user stores?
    Thanks in advance,
    Kiran

    Hi Kiran,
    I User object works for both the cases. Just try the below code.
    <%@ page import = "com.sap.security.api.IUser" %>
         private void getUser() {
              user = compRequest.getUser();
              userId = user.getUniqueID();
              userName = user.getUniqueName();
    It worked for me for getting the users from LDAP.
    Regards,
    Santhosh

  • Setting system properties: difference between "-D" and "System.setProperty"

    Hi.
    I have a program that relies on the jogl library to display graphics. Internally, jogl loads a native library from disk, with a System.loadLibrary() call. In turn, loadLibrary searches the paths in the system property "java.library.path" to find the jogl DLL/SO files. So, it is my responsibility to ensure that the "java.library.path" property is correctly set.
    There are two ways that I know of to set system properties: as an argument to the JRE via the "-D" option and from within an application with the System.setProperty method. However, I have noticed that only the former gives the desired behavior. That is, if I do:
    java -Djava.library.path=lib MyProgram{code}
    the code in jogl.jar is able to successfully find and load the native libraries in lib/, but if I do:
    {code:java}System.setProperty("java.library.path", "lib");{code}
    at the beginning of main in my program (before the classes requiring jogl are loaded), I end up with an UnsatisfiedLinkError.
    Why does this happen? Why do the 2 methods produce different results? Is specifying native library paths on the command line the only way to ensure that they are found?                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           

    See the [System Properties Tutorial|http://java.sun.com/docs/books/tutorial/essential/environment/sysprop.html] section on "Writing System Properties" which says:
    Warning: Changing system properties is potentially dangerous and should be done with discretion. Many system properties are not reread after start-up and are there for informational purposes. Changing some properties may have unexpected side-effects.
    Also see the [setting java.library.path property in java code|http://forums.sun.com/thread.jspa?threadID=627890] thread in the JNI forum.

  • What is the main difference between menu_exits and user_exits

    what is the main difference between menu_exits and user_exits

    Hi,
    User Exits:
    A user exit is a three character code that instructs the system to access a program during system processing.
    SXX: S is for standard exits that are delivered by SAP. XX represents the 2-digit exit number.
    UXX: U is for user exits that are defined by the user. XX represents the 2-digit exit number
    Menu Exits:
    Menu exits add items to the pulldown menus in standard SAP applications. You can use these menu items to call up your own screens or to trigger entire add-on applications.
    SAP creates menu exits by defining special menu items in the Menu Painter. These special entries have function codes that begin with "+" (a plus sign). You specify the menu item’s text when activating the item in an add-on project.
    Regards,
    Priyanka.

  • Activity System status: differences between u0093Openu0094 and u0093In processu0094 status

    Dear Experts,
    What’s the difference between “Open” and “In process” system status? In help.sap.com it: “There are four system statuses that represent the life cycle of the business transaction:
    • Open: has been recently created and not yet processed (for example, contract from the Internet)
    • In process: administrator is clearing up questions”
    But, how does the system assumes the “In Process” status ?? I‘ve tested business activities creation with different employees assigned and, when editing and saving the business activities with these BP’s the system status does not change.
    However, in other “unknown” situations the status system is changed to “in Process”.
    Any ideas about the meaning of the “In Process” status? And when the business activity switches to that?
    Thanks in advance,
    Joao

    Hi,
    These four system statuses that represent the life cycle of the business transaction:
    ·        Open: has been recently created and not yet processed (for example, contract from the Internet)
    ·        In process: administrator is clearing up questions
    ·        Released: contract is complete and legal. Follow-up processes can be started (printing, billing, distribution, releases and so on)
    ·        Completed: All actions directly linked to contract are completed
    ·        Closed: all actions indirectly linked to the contract are closed (for example, from R/3: batch run to actual costs)
    Each status having its own control at the configuration level. If you observe the following process you may understand the importance of various statuses.
    For example in any transaction by default status would be Open. Once the transaction opened by the respective responsible person he will change the status as In Process, Once the assigned task is completed he will change the status as Completed.
    Please notice the configuration settings in the following navigation path:
    SPRO->IMG->CRM->Transactions->Basic Functions->Status Management-> Change Status Profile for User Status->Select Quotation->Double click on the different status. You can observe the difference.
    Hope I convinced.
    Best Regards,
    Johnny.
    Reward if it helps.

  • Can you tell me some differences between R2 and R3 systems?

    Hi,
    Can you tell me some differences between R2 and R3 systems?
    I guess R2 is used only for mainframe systems some time back. But i dont know why we prefered R3 over R2.
    Please clarify this!
    Thanks,
    Venkatesh.R.

    SAP R/3 is
    Client server
    3 tier
    Presentation
    Application
    Database
    Relatively hardware and database independent
    ABAP/4 applications runs on application servers.
    Dispatcher, shared memory, gateway, work processes are major components of an application server.
    SAP R/3 offers
    Comprehensive suite of integrated applications meeting the needs of most business
    Best practice process design
    Ability to configure to
    Industry sector
    Unique business requirements
    In a R/2  System - it is a 2 Tier System based on Mainframe Systems with Intelligent terminals
    R/3 is based 3 tier Client Server architechture and supports the R/2 system as well.
    R/3 Middleware -
    Client server
    Uses underlying relational databases
    Oracle
    SQL server
    Ingress
    Sybase
    Its graphical user interface
    Sap GUI
    hence R/3 is preffered over R/2 systems because they support Client Server Architecture which is easily configurable,scalable and can integrate with ERP systems and integrate with SOA or Web based Apps.
    Thanks,
    Saurabh Shukla

  • Difference Between BADI and User Exits

    Hi..
    generally BADIs & User Exis are used exensively in SAP SD...
    Can anybody throw some light waht is difference between them ...
    Kindly please reply......
    Regards
    Nisha

    Hi
    ifference Between BADI and User Exits
    Business Add-Ins are a new SAP enhancement technique based on ABAP Objects. They can be inserted into the SAP System to accommodate user requirements too specific to be included in the standard delivery. Since specific industries often require special functions, SAP allows you to predefine these points in your software.
    As with customer exits two different views are available:
    In the definition view, an application programmer predefines exit points in a source that allow specific industry sectors, partners, and customers to attach additional software to standard SAP source code without having to modify the original object.
    In the implementation view, the users of Business Add-Ins can customize the logic they need or use a standard logic if one is available.
    In contrast to customer exits, Business Add-Ins no longer assume a two-level infrastructure (SAP and customer solutions), but instead allow for a multi-level system landscape (SAP, partner, and customer solutions, as well as country versions, industry solutions, and the like). Definitions and implementations of Business Add-Ins can be created at each level within such a system infrastructure.
    SAP guarantees the upward compatibility of all Business Add-In interfaces. Release upgrades do not affect enhancement calls from within the standard software nor do they affect the validity of call interfaces. You do not have to register Business Add-Ins in SSCR.
    The Business Add-In enhancement technique differentiates between enhancements that can only be implemented once and enhancements that can be used actively by any number of customers at the same time. In addition, Business Add-Ins can be defined according to filter values. This allows you to control add-in implementation and make it dependent on specific criteria (on a specific Country value, for example).
    All ABAP sources, screens, GUIs, and table interfaces created using this enhancement technique are defined in a manner that allows customers to include their own enhancements in the standard. A single Business Add-In contains all of the interfaces necessary to implement a specific task.
    The actual program code is enhanced using ABAP Objects. In order to better understand the programming techniques behind the Business Add-In enhancement concept, SAP recommends reading the section on ABAP Objects.
    What is difference between badi and user-exists?
    What is difference between enhancements and user-exists? and what is the full form of BADI?
    I have another doubt in BDC IN BDC WE HAVE MSEGCALL (i did not remember the > correct name) where the error logs are stored, MSEGCALL is a table or structure.
    What is the system landscape?
    1) Difference between BADI and USER-EXIT.
        i) BADI's can be used any number of times, where as USER-EXITS can be used only one time.
           Ex:- if your assigning a USER-EXIT to a project in (CMOD), then you can not assign the same to other project.
        ii) BADI's are oops based.
    2) About 'BDCMSGCOLL' it is a structure.  Used for finding error records.
    3) Full form of BADI 'Business addins'.
    3) System land scape will be depends on your project
        Ex:- 'Development server'>'Quality server'-> 'Production server'......

  • What's the difference between OEM and standart licensing of VMware vSphere for users?

    Good day,
    Could you please explain me,
    What's the difference between OEM and standart licensing of VMware vSphere for users?

    The difference is usually the support you get. With OEM versions you'll often get support from the OEM and not from VMware directly.
    André

Maybe you are looking for

  • Elements Editor 7 stopped working...Help...(possibly visual runtime c++)

    I have Windows Vista 64 bit with 4.00 GB RAM (If that matters) and Adobe Photoshop Elements 7.  It had worked perfectly fine since I bought it in March of 2009 until about 3 weeks ago (Only the Editor stopped working - the Organizer still works fine)

  • Late 2013 15 MBP Win 7 Bootcamp, user feedback?

    Hey. Im considering getting a new 15 Macbook Pro, and need some serious feedback on Bootcamp. I currently have a mid 2010 MBP i5, 2.53 ghz 4 gb ram, running Win 7 64 bit, and have been experiencing alot of overheating and graphics kernel problems (sc

  • WS-C2960-24TC-L - %PLATFORM_PM-3-HOSTACCESSFAIL - error

    Hello, I have issue with 3 ports on the switch. Once I put he following commands under the port I got error message :  authentication control-direction in authentication host-mode multi-auth authentication port-control auto authentication periodic au

  • Restoring Library after PC Crash

    My Windows PC with iTunes Library Crashed.  Am trying to get to the point where my iPad, iPhones, and iPod can sync with the new library.  I have transfered all the content from my devices to the PC to get the music files onto the new PC and into iTu

  • FCP, STP, Media Manager happy together?

    Background: With FCP 5.1.2 I am having some issues with media managing a 25 minute SD sequence from a large project. My goal is to move the sequence and clips to an external drive from the main editing system. The problem is that when I media manage(