Difference between target schema and target user
hi,
Can anyone explain to me what is the difference between target schema and target user? examples will be more welcome then theoratical explanation.
thanks so much
In Oracle database schema and user is the same things (if you use general authentication by database).
When used external authentication (for example with Windows domains/active directory) schema is a owner of database objects group and you should specify mapping between external usernames and schema to which this user has access when connects to database.
For example:
- windows domain user CORPDOMAIN\USER1 can connect to oracle database schema SCOTT;
- windows domain user CORPDOMAIN\USER2 can connect to oracle database schema SCOTT;
- windows domain user CORPDOMAIN\ADMIN can connect to oracle database schema SYSTEM;
Oleg
Message was edited by:
tsiboleg
Similar Messages
-
Difference Between Database Schema and Database User Account ??
First i would like to know what an Oracle Database schema exactly is ?
And what is it for and also What is it's use ?
Later the exact "Difference Between Database Schema and Database User Account".
I googled about it but i'm unable to find out it's The difference,
Please try to explain in a simple manner........
Thank you very Much in Advance..........user13655582 wrote:
Greate example. but i would like add one more point..
a user is a schema and schema is a user. but when this applies to the user that he become a schema, only if he has got some objects. so we can say while creating the user which dosent contain any objects called simple user account but afterwords when he has got an objects then we can say its a schema as the above user has shown you through the exampleIt is just word-play. There is nothing in like a 'status' indicator to say "USER_A is just a user but USER_B has become a schema". Many people use the terms "user" and "schema" interchangeably, and some very good DBAs will insist this is correct. I don't disagree with them even though I usually try to make the distinction.
In a typical application, all of the objects (tables, procedures, etc) that implement the app will be owned by a "application schema owner" - a user which exists for the sole purpose of owning the schema. Said user will have no privileges at all .. especially not CREATE SESSION. Except for possible maintenance activity no one ever actually connects as this user. User accounts are then given to actual humans who connect with their own accounts. The accounts have the necessary system and object privileges granted to them - via a role. One could also create a special account (let's call it APP_ADMIN) that is used for maintenance and batch operations within the application. -
Exact difference between System status and the user status
Hi,
Please tell me the exact difference between System status and the user status .
how we customize the both in the system
Thanks & Regards
Prajith P
Moderation: Locked. Please, try to find an answer first. See rules of engagement
Edited by: Joaquin Fornas on Feb 23, 2012 11:14 AMHi,
As you mentioned there are 2 status can be maintained for documents like Equipment Master, Notification, Maintenance Order & other important business documents.
In case, client feels that system status is not enough to capture the details of the object, then user status can be used.
System statuses will be updated automatically based on business transactions which will be done on SAP.
For example, once the equipment is created, System status would CRTD (Created). If you install the same to some superior equipment or FL, then status would be INST (Installed).
If you keeping that equipment in Spare, then for that, you have to maintain separate User Status like AVLB (Available in Stock / Spare) so that through IH08, by using User status, you can the report which is available as spare.
These user status as per the name, should be updated by the user manually.
Regards,
Maheswaran. -
Difference between plan,actual and target in order
hi
plz tell me ans.
In the manufacturing order WHAT is the difference PLAN, ACTUAL and TARGET.
In the CK11N, we will estimate plan cost for one finished product but in order we are taking 2 costing variant that is PRODUCTION ORDER PLANDED (PPP1) and PRODUCTION ORDER ACTUAL(PPP2) . in the ORDER calculation which is taken as an account and tell me their functionality separately
thank u
sowmyaPlan Cost means this is the cost of Product or Material or Activity or any others statistical price which we estimate and Plan prices for organizations future activities.
Actual cost is the original/Actual cost we incurred for Product or Material or Activity or any other.
Target cost are the costs that are expected for a certain operating rate. It is the dynamic value which will be calculated on the basis Operating rate (Operating rate = (Actual activity / Plan activity) X 100), and It is a consistent basis useful for comparisons of the plan and actual costs of a period.
Ex:
we plan $110 per hour of Labor activity.
but we incurred $125 as actual cost.
for this Target cost is (125/110)*100=113
We use Costing variant for plan to calculate plan price of Order.
when order is created system posts planned costs to the order according to standard cost estimate of product, which uses the planned cost variant.
when the production is carried out Actual costs are posted to the order using Costing variant for actual. when order is completed system uses this two values to calculate the variance of production order. which can be settled to FI.
Hope U got... -
Difference between emergency state and single user mode ?
Hi,
I want to know the difference between emergency state which we normally use in suspect mode database and single user mode.
NavakanthEmergency/suspect mode is tells you the state of the database and database is not available for user action but where as single user mode tells the user action preference. Database is active and available for the user action.
You can refer
http://msdn.microsoft.com/en-us/library/bb522682.aspx
EMERGENCY
The database is marked READ_ONLY, logging is disabled, and access is limited to members of the sysadmin fixed server role. EMERGENCY is primarily used for troubleshooting purposes. For example, a database marked as suspect due to a corrupted log file can be
set to the EMERGENCY state. This could enable the system administrator read-only access to the database. Only members of the sysadmin fixed server role can set a database to the EMERGENCY state.
SINGLE_USER
Specifies that only one user at a time can access the database. If SINGLE_USER is specified and there are other users connected to the database the ALTER DATABASE statement will be blocked until all users disconnect from the specified database. To override
this behavior, see the WITH <termination> clause.
The database remains in SINGLE_USER mode even if the user that set the option logs off. At that point, a different user, but only one, can connect to the database.
Before you set the database to SINGLE_USER, verify the AUTO_UPDATE_STATISTICS_ASYNC option is set to OFF. When set to ON, the background thread used to update statistics takes a connection against the database, and you will be unable to access the database
in single-user mode. To view the status of this option, query the is_auto_update_stats_async_on column in the sys.databases catalog view.
If the option is set to ON, perform the following tasks:
Set AUTO_UPDATE_STATISTICS_ASYNC to OFF.
Check for active asynchronous statistics jobs by querying the sys.dm_exec_background_job_queue dynamic management view.
If there are active jobs, either allow the jobs to complete or manually terminate them by using KILL STATS JOB.
--Prashanth -
Difference between RFC, SYSTEM and AUDIT users?
Hi All,
Can you highlight the main differences between the following users:
RFC
SYSTEM
AUDIT
how do their functions differenciate them ?
Thanks in advance,
DiwakarRFC User
RFC user is basicly used to receive status messages. An RFC user has to be created in all the system clients where messages needs to be recieved. An RFC user can also be used for receiving messages using SMTP plug-in.
The RFC User is an sap user of type System and that's why no person can logon with this user on SAP System.
Following is thr procedure to create RFC User, remember the purpose is to recieve messages including status messages as well.
Creation of RFC User
Go to Tools > Administration > User Maintenance > Users.
Enter a name, for example MAIL_ADMIN.
Select "New"
On the Logon data tab page, select the user type System.
Enter a password.
On the Profiles tab page, enter the authorization profile S_A.SCON. This profile minimizes the risk of misuse, even if the communication system does not store the password is encoded form.
Select "Save"
Both RFC user and a System user are of type System only. Now the difference, depends upon the profile and authorization of the user.
Audit users are of type dialog, and can be used by a person to logon to system. There might be many roles assigned to this user. My understanding is that an Audit User is not a standard sap type user but just a dialog user and can be created with a conventional method of creating any other dialog users with a specific profile and authorizations.
Still to confirm, Can you please tell us, how many types of users does it shown in 4.6c at the time of user creation?
Best Regards,
Amol Bharti -
UNIX / LINUX: difference between the oracle and dba user on the filesystem
I have always logged into the server with the oracle user to perform impdp/expdp, as well as alter the tnsnames.ora file, and to run tkprof.
We're possibly going to start up a server in our datacenter where we're only going to be able to log into the server as dba. I'm being asked if that's going to be a problem for me to fulfill my duties.
Could someone give a description of the difference between the 2 accounts at the filesystem level? Or link me to a document? It's been 6+ years since we made this decision to log in as oracle, and so I am admittedly rusty on the topic.
--=cfIt is becoming more common to not allow a direct login to the server as oracle. Instead the DBAs each have their own account (and be members of the dba group). These DBAs have SUDO permission to SUDO SU (switch user) to the oracle account so that there is a log of who was operating as oracle on the server at the time. This could be what you are hearing about. Check with your sysadmins and see if this is what they intend - it should satisfy their security (and audit) requirements.
-
Difference between Source Qualifier and Target instance Pre/PostSQL ?
Hi All, Please guide me on question.
Hi All, I have installed informatica Powercemtre and Oracle on windows 7. Have completed the below steps:1. Installed Oracle2. Informatica server and client Configured domain and node3. Created repository and integration service both the services are up running4. Created informatica_repository in client
getting the below error while trying to connect or add to the repository 08/05/2015 16:16:05-[REP_12164] Domain-related error: [[DOM_10033] [DOM_10033] Service [informatica_repository] does not exist in domain [Domain_Shan]. [FAULT_PCSFCONFIGEXCEPTION]].08/05/2015 16:16:08-[REP_55102] Failed to connect to repository service [informatica_repository].08/05/2015 16:17:03-[REP_12164] Domain-related error: [[DOM_10033] [DOM_10033] Service [informatica_repository] does not exist in domain [Domain_Shan]. [FAULT_PCSFCONFIGEXCEPTION]].08/05/2015 16:17:06-[REP_55102] Failed to connect to repository service [informatica_repository]. Domain Name: Domain_ShanHost: ShanPort : 6001 tried the below possible solutions1. Update hosts file with machine ip and host name2. Checked for Oracle services and Informatica services 3. Tried deleting and recreatinf repository Please can anyone suggest solution for this. Thanks,Avinash -
Difference between capture schema and import/register schema
As far as versioning control, what are the differences, if any, between 1.) capturing a schema's objects thru design editor and 2.) importing and registering a schema?
Capturing a schema will create instances of the TABLE type in the Designer model.
Registration creates a new model with new types in the Repository.
DAvid -
Differences between Roles, Schemas, Users and Logins.
I need differences between Roles, Schemas, Users and Logins. Can anyone help me. Thanks in advance
Roles:
I think of creating roles in the database to group users of like
function. Roles are granted certain permissions in the database. You
should become familiar with the fixed database roles since these will be
utilized once you start creating users within the database. Also, once
you see the type of permissions that are granted to each role, is makes
more sense.
Schema: there can be several schemas in a database,
which will house different types of objects such as tables, indexes,
stored procedures, functions, etc. Users own schemas. Looking into
the AdventureWorks database illustrates this concept, with several
schemas like HR, Production, etc.
Login: Think about login as
gaining access to the SQL Server instance. If a user account is not
granted any permissions within the instance, you basically just were
able to unlock the door and enter the room, by creating a user you then
grant access to the database objects or principals, and can begin to
work with them.
Users: Users own schemas, and as such will be
able to manipulate the objects they own. Some of the manunipulations
are very permissive, such as creating tables, indexes, stored
procedures, functions, etc. These are developers and administrators.
Users
are created and granted permissions for application use, which will
have select, update, insert, and delete and execute permissions to a
finite set of objects in the schema, for which the application will need
to function properly.
In a client server database, as an
example, of the structure. Roles were defined which provides the
permissions to the database objects in the database, which only has one
schema 'dbo'. One SQL server login was created with the same username,
and dbo is the assigned default schema, and the roles assigned to that
username.
In the application, each specific user is given there own
"application" login which is mapped to the one defined sql server
login.
Ahsan Kabir Please remember to click Mark as Answer and Vote as Helpful on posts that help you. This can be beneficial to other community members reading the thread. http://www.aktechforum.blogspot.com/ -
Target Schema and Runtime Instance of Oracle Database
I am new to OWB and starting to understand its architecture.
Does the Runtime Access User, Runtime Repository Schema and Target Schema (discussed a the Runtime Instance) need to be installed on every database that will be a target? For example, if I have a data warehouse and two data marts, with I have three installations?Hi,
You need to run the OWB Runtime Assistent for every target schema, that is correct (it will add the auditing stuff that enables you to monitor what's happening deployment and execution wise).
Whether you need to create a Runtime Repository and its accompanying Runtime Access User(s) for each and every target I'm not sure.
If your target schema's are on the same instance I'd say that you can use as few or many Runtime Repositories as you wish.
When on different instances I think it's necessary to create them.
Hopefully other forum-attendees can add some more if they have definite answers.
Cheers, Patrick -
Cloning use the different gcc version between source system and target sys
Hi All,
Our system is: Application tier and Database tier is split to two servers.
We should run a cloning, but I found the different gcc version on application tier on source system and target system.
The source application tier server is RedHat Linux ES3, gcc version is 3.2.3
The target application tier server is RedHat Linux ES3, gcc version is 2.9.6
There is the same gcc version on database tier on source system and target system, they are gcc 2.9.6.
My question: Can I use the different gcc version between source system and target system when I run an erp cloning?
Thanks & Regards
OwenNot necessarily, you might get some errors if the version is higher and it is not supported by the OS. An example is Note: 392311.1 - usr/lib/gcc/i386-redhat-linux/3.4.5/libgcc_s.so: undefined reference to 'dl_iterate_phdr@GLIBC_2.2.4'
To be on the safe side, make sure you have the same version (unless you want to give it a try). -
Difference between database design and schema design
Hi i have visited so many database websites and i found so many people saying we can design a data base for you. Is schema designing and database designing is the same. so many palces i find people saying we have to design data base first in order to create a physical databse. so i am little bit confused. are they same? and also what is the difference between data model and schema?
> the definition i found for logical data model, physical data model and the definition you
gave for logical database design, physical database design are the same.
Not correct. The physical design is the implemetation of the logical design. These two designs are at different levels. Also, the logical design will be the same. irrespective of the RDBMS product use.
What is incorrect is a designer/architect designing a logical design specifically for Oracle.. or specifically for SQL-Server. A logical design has nothing to do with the RDBMS product (or h/w platforms. app servers, web severs and operating systems used).
So the logical design will always be the same - it is RDBMS independent.
The physical design is fully dependent on the RDBMS product used. The same logical design will be implemented as different physical designs for Oracle and for SQL-Server. -
What is the difference between WEP, WPA, and WPA2? My router is set up on my family PC and connected to a modem so I access Wi-fi through my laptop and my sister has a laptop too and uses our family network to get internet. I just set up a WPA today, so will we all be able to get internet (along with my family using the pc, and my sis on her laptop, even at the same time) protected? (like nobody else using our network)
Wired Equivalent Privacy, commonly called WEP is 802.11's first hardware form of security where both the WAP and the user are configured with an encryption key of either 64 bits or 128 bits in HEX. So when the user attempts to authenticate, the AP issues a random challenge. The user then returns the challenge, encrypted with the key. The AP decrypts this challenge and if it matches the original the client is authenticated. The problem with WEP is that the key is static, which means with a little time and the right tool a hacker could use reverse-engineering to derive the encryption key. It is important to note that this process does affect the transmission speed.
WPA builds upon WEP, making it more secure by adding extra security algorithms and mechanisms to fight intrusion.
WiFi Protected Access (WPA) is the new security standard adopted by the WiFi Alliance consortium. WiFi compliance ensures interoperability between different manufacturer’s equipment.WPA delivers a level of security way beyond anything that WEP can offer, bridges the gap between WEP and 802.11i networks, and has the advantage that the firmware in older equipment may be upgradeable.
WPA2 is based upon the Institute for Electrical and Electronics Engineers’ (IEEE) 802.11i amendment to the 802.11 standard, which was ratified on July 29, 2004. The primary difference between WPA and WPA2 is that WPA2 uses a more advanced encryption technique called AES (Advanced Encryption Standard), allowing for compliance with FIPS140-2 government security requirements. -
Difference between dynamic actions and user exit
Hi,
Please help me in when to use table T588z and user exit to write code for dynamic actions.
Thanks,
VenkatHi Prasad,
Find the difference between Dynamic action and user exits.
Dynamic Action User Exits
1. Here only initialization of an infotype 1. Along with initialization of an infotype, depending upon other infotype validation also can be done like in
can be done. IT 16 the contract end date can not be
entered more than 6 months.
2. Less time consuming to write. 2. Require programming approch so more
time consuming.
3. Table T588Z 3. PBAS0001
Br/Manas
Maybe you are looking for
-
ABAP Query - Want to limit the number of records to 5
I have a query based on a a table join (MKPF with MSEG) infoset. I want to limit the number of records to first five. How to deal with it?
-
Help with query - multiple where in grouped column
4 columns in table named RRID1 RRI_ID USER_ID PROCESS_TYPE FUNCTION not sure how to make this query. Need to pull all RRI_ID's where PROCESSTYPE ='INFO' and PROCESSTYPE ='RESOLUTION' for that RRI_ID. so same user, same RRI_ID and 2 process records, 1
-
I am unable to convert a pdf file to word as I get the error message indicates it contains XFA forms
I am unable to convert a pdf file to word as I get the error message that pdf files containing XFA forms cannot be saved to the specified format.
-
JEditorPane: HTML Table: Wrong cells height calculation
<table> <tr> �<td width="200" height="5" bgcolor="red"><td> </tr> <tr> <td width="200" height="5" bgcolor="green"><td> </tr> <tr> <td width="200" height="5" bgcolor="blue"><td> </tr> </table> Just for l
-
Incomplete instances for multiuser login giving null pointer exception error
Hi I am facing one problem about Weblogic workflow. We have developed an application where number of users logs in simultaneouly. When a user logs in, one instance of workflow gets created. So when more than one user logs in, that many instanaces get