Difference between target schema and target user

hi,
Can anyone explain to me what is the difference between target schema and target user? examples will be more welcome then theoratical explanation.
thanks so much

In Oracle database schema and user is the same things (if you use general authentication by database).
When used external authentication (for example with Windows domains/active directory) schema is a owner of database objects group and you should specify mapping between external usernames and schema to which this user has access when connects to database.
For example:
- windows domain user CORPDOMAIN\USER1 can connect to oracle database schema SCOTT;
- windows domain user CORPDOMAIN\USER2 can connect to oracle database schema SCOTT;
- windows domain user CORPDOMAIN\ADMIN can connect to oracle database schema SYSTEM;
Oleg
Message was edited by:
tsiboleg

Similar Messages

  • Difference Between Database Schema and Database User Account ??

    First i would like to know what an Oracle Database schema exactly is ?
    And what is it for and also What is it's use ?
    Later the exact "Difference Between Database Schema and Database User Account".
    I googled about it but i'm unable to find out it's The difference,
    Please try to explain in a simple manner........
    Thank you very Much in Advance..........

    user13655582 wrote:
    Greate example. but i would like add one more point..
    a user is a schema and schema is a user. but when this applies to the user that he become a schema, only if he has got some objects. so we can say while creating the user which dosent contain any objects called simple user account but afterwords when he has got an objects then we can say its a schema as the above user has shown you through the exampleIt is just word-play. There is nothing in like a 'status' indicator to say "USER_A is just a user but USER_B has become a schema". Many people use the terms "user" and "schema" interchangeably, and some very good DBAs will insist this is correct. I don't disagree with them even though I usually try to make the distinction.
    In a typical application, all of the objects (tables, procedures, etc) that implement the app will be owned by a "application schema owner" - a user which exists for the sole purpose of owning the schema. Said user will have no privileges at all .. especially not CREATE SESSION. Except for possible maintenance activity no one ever actually connects as this user. User accounts are then given to actual humans who connect with their own accounts. The accounts have the necessary system and object privileges granted to them - via a role. One could also create a special account (let's call it APP_ADMIN) that is used for maintenance and batch operations within the application.

  • Exact difference between System status and the user status

    Hi,
    Please tell me the exact difference between System status and the user status .
    how we customize the both in the system
    Thanks & Regards
    Prajith P
    Moderation: Locked. Please, try to find an answer first. See rules of engagement
    Edited by: Joaquin Fornas on Feb 23, 2012 11:14 AM

    Hi,
    As you mentioned there are 2 status can be maintained for documents like Equipment Master, Notification, Maintenance Order & other important business documents.
    In case, client feels that system status is not enough to capture the details of the object, then user status can be used.
    System statuses will be updated automatically based on business transactions which will be done on SAP.
    For example, once the equipment is created, System status would CRTD (Created). If you install the same to some superior equipment or FL, then status would be INST (Installed).
    If you keeping that equipment in Spare, then for that, you have to maintain separate User Status like AVLB (Available in Stock / Spare) so that through IH08, by using User status, you can the report which is available as spare.
    These user status as per the name, should be updated by the user manually.
    Regards,
    Maheswaran.

  • Difference between plan,actual and target in order

    hi
    plz tell me ans.
    In the manufacturing order WHAT is the difference PLAN, ACTUAL and TARGET.
    In the CK11N, we will estimate plan cost for one finished product but in order we are taking 2 costing variant that is PRODUCTION ORDER PLANDED (PPP1) and PRODUCTION ORDER ACTUAL(PPP2) . in the ORDER calculation which is taken as an account  and  tell me their functionality separately         
    thank u
    sowmya

    Plan Cost means this is the cost of Product or Material or Activity or any others statistical price which we estimate and Plan prices for organizations future activities.
    Actual cost is the original/Actual cost we incurred for Product or Material or Activity or any other.
    Target cost are the costs that are expected for a certain operating rate.  It is the dynamic value which will be calculated on the basis Operating rate (Operating rate = (Actual activity / Plan activity) X 100), and It is a consistent basis useful for comparisons of the plan and actual costs of a period.
    Ex:
    we plan $110 per hour of Labor activity.
    but we incurred $125 as actual cost.
    for this Target cost is (125/110)*100=113
    We use Costing variant for plan to calculate plan price of Order. 
    when order is created system posts planned costs to the order according to standard cost estimate of product, which uses the planned cost variant.
    when the production is carried out Actual costs are posted to the order using Costing variant for actual.  when order is completed system uses this two values to calculate the variance of production order. which can be settled to FI.
    Hope U got...

  • Difference between emergency state and single user mode ?

    Hi,
    I want to know the difference between emergency state which we normally use in suspect mode database and single user mode.
    Navakanth

    Emergency/suspect mode is tells you the state of the database and database is not available for user action but where as single user mode tells the user action preference. Database is active and available for the user action.
    You can refer 
    http://msdn.microsoft.com/en-us/library/bb522682.aspx
    EMERGENCY
    The database is marked READ_ONLY, logging is disabled, and access is limited to members of the sysadmin fixed server role. EMERGENCY is primarily used for troubleshooting purposes. For example, a database marked as suspect due to a corrupted log file can be
    set to the EMERGENCY state. This could enable the system administrator read-only access to the database. Only members of the sysadmin fixed server role can set a database to the EMERGENCY state.
    SINGLE_USER
    Specifies that only one user at a time can access the database. If SINGLE_USER is specified and there are other users connected to the database the ALTER DATABASE statement will be blocked until all users disconnect from the specified database. To override
    this behavior, see the WITH <termination> clause.
    The database remains in SINGLE_USER mode even if the user that set the option logs off. At that point, a different user, but only one, can connect to the database.
    Before you set the database to SINGLE_USER, verify the AUTO_UPDATE_STATISTICS_ASYNC option is set to OFF. When set to ON, the background thread used to update statistics takes a connection against the database, and you will be unable to access the database
    in single-user mode. To view the status of this option, query the is_auto_update_stats_async_on column in the sys.databases catalog view.
    If the option is set to ON, perform the following tasks:
    Set AUTO_UPDATE_STATISTICS_ASYNC to OFF.
    Check for active asynchronous statistics jobs by querying the sys.dm_exec_background_job_queue dynamic management view.
    If there are active jobs, either allow the jobs to complete or manually terminate them by using KILL STATS JOB.
    --Prashanth

  • Difference between RFC, SYSTEM and AUDIT users?

    Hi All,
    Can you highlight the main differences between the following users:
    RFC
    SYSTEM
    AUDIT
    how do their functions differenciate them ?
    Thanks in advance,
    Diwakar

    RFC User
    RFC user is basicly used to receive status messages. An RFC user has to be created in all the system clients where messages needs to be recieved. An RFC user can also be used for receiving messages using SMTP plug-in.
    The RFC User is an sap user of type System and that's why no person can logon with this user on SAP System.
    Following is thr procedure to create RFC User, remember the purpose is to recieve messages including status messages as well.
    Creation of RFC User
    Go to  Tools > Administration > User Maintenance > Users.
    Enter a name, for example MAIL_ADMIN.
    Select "New"
    On the Logon data tab page, select the user type System.
    Enter a password.
    On the Profiles tab page, enter the authorization profile S_A.SCON. This profile minimizes the risk of misuse, even if the communication system does not store the password is encoded form.
    Select "Save"
    Both RFC user and a System user are of type System only. Now the difference, depends upon the profile and authorization of the user.
    Audit users are of type dialog, and can be used by a person to logon to system. There might be many roles assigned to this user. My understanding is that an Audit User is not a standard sap type user but just a dialog user and can be created with a conventional method of creating any other dialog users with a specific profile and authorizations.
    Still to confirm, Can you please tell us, how many types of users does it shown in 4.6c at the time of user creation?
    Best Regards,
    Amol Bharti

  • UNIX / LINUX: difference between the oracle and dba user on the filesystem

    I have always logged into the server with the oracle user to perform impdp/expdp, as well as alter the tnsnames.ora file, and to run tkprof.
    We're possibly going to start up a server in our datacenter where we're only going to be able to log into the server as dba. I'm being asked if that's going to be a problem for me to fulfill my duties.
    Could someone give a description of the difference between the 2 accounts at the filesystem level? Or link me to a document? It's been 6+ years since we made this decision to log in as oracle, and so I am admittedly rusty on the topic.
    --=cf

    It is becoming more common to not allow a direct login to the server as oracle. Instead the DBAs each have their own account (and be members of the dba group). These DBAs have SUDO permission to SUDO SU (switch user) to the oracle account so that there is a log of who was operating as oracle on the server at the time. This could be what you are hearing about. Check with your sysadmins and see if this is what they intend - it should satisfy their security (and audit) requirements.

  • Difference between Source Qualifier and Target instance Pre/PostSQL ?

    Hi All, Please guide me on question.

    Hi All, I have installed informatica Powercemtre and Oracle on windows 7. Have completed the below steps:1. Installed Oracle2. Informatica server and client Configured domain and node3. Created repository and integration service both the services are up running4. Created informatica_repository in client  
    getting the below error while trying to connect or add to the repository 08/05/2015 16:16:05-[REP_12164] Domain-related error: [[DOM_10033] [DOM_10033] Service [informatica_repository] does not exist in domain [Domain_Shan]. [FAULT_PCSFCONFIGEXCEPTION]].08/05/2015 16:16:08-[REP_55102] Failed to connect to repository service [informatica_repository].08/05/2015 16:17:03-[REP_12164] Domain-related error: [[DOM_10033] [DOM_10033] Service [informatica_repository] does not exist in domain [Domain_Shan]. [FAULT_PCSFCONFIGEXCEPTION]].08/05/2015 16:17:06-[REP_55102] Failed to connect to repository service [informatica_repository]. Domain Name: Domain_ShanHost: ShanPort : 6001  tried the below possible solutions1. Update hosts file with machine ip and host name2. Checked for Oracle services and Informatica services 3. Tried deleting and recreatinf repository  Please can anyone suggest solution for this. Thanks,Avinash

  • Difference between capture schema and import/register schema

    As far as versioning control, what are the differences, if any, between 1.) capturing a schema's objects thru design editor and 2.) importing and registering a schema?

    Capturing a schema will create instances of the TABLE type in the Designer model.
    Registration creates a new model with new types in the Repository.
    DAvid

  • Differences between Roles, Schemas, Users and Logins.

    I need differences between Roles, Schemas, Users and Logins. Can anyone help me. Thanks in advance

    Roles:
    I think of creating roles in the database to group users of like
    function.  Roles are granted certain permissions in the database.  You
    should become familiar with the fixed database roles since these will be
    utilized once you start creating users within the database.  Also, once
    you see the type of permissions that are granted to each role, is makes
    more sense.
    Schema: there can be several schemas in a database,
    which will house different types of objects such as tables, indexes,
    stored procedures, functions,  etc.  Users own schemas.  Looking into
    the AdventureWorks database illustrates this concept, with several
    schemas like HR, Production, etc.
    Login: Think about login as
    gaining access to the SQL Server instance.  If a user account is not
    granted any permissions within the instance, you basically just were
    able to unlock the door and enter the room, by creating a user you then
    grant access to the database objects or principals, and can begin to
    work with them. 
    Users:  Users own schemas, and as such will be
    able to manipulate the objects they own.  Some of the manunipulations
    are very permissive, such as creating tables, indexes, stored
    procedures, functions, etc.  These are developers and administrators.
    Users
    are created and granted permissions for application use, which will
    have select, update, insert, and delete and execute permissions  to a
    finite set of objects in the schema, for which the application will need
    to function properly.
    In a client server database, as an
    example, of the structure.  Roles were defined which provides the
    permissions to the database objects in the database, which only has one
    schema 'dbo'. One SQL server login was created with the same username,
    and dbo is the assigned default schema, and the roles assigned to that
    username. 
    In the application, each specific user is given there own
    "application" login which is mapped to the one defined sql server
    login.
    Ahsan Kabir Please remember to click Mark as Answer and Vote as Helpful on posts that help you. This can be beneficial to other community members reading the thread. http://www.aktechforum.blogspot.com/

  • Target Schema and Runtime Instance of Oracle Database

    I am new to OWB and starting to understand its architecture.
    Does the Runtime Access User, Runtime Repository Schema and Target Schema (discussed a the Runtime Instance) need to be installed on every database that will be a target? For example, if I have a data warehouse and two data marts, with I have three installations?

    Hi,
    You need to run the OWB Runtime Assistent for every target schema, that is correct (it will add the auditing stuff that enables you to monitor what's happening deployment and execution wise).
    Whether you need to create a Runtime Repository and its accompanying Runtime Access User(s) for each and every target I'm not sure.
    If your target schema's are on the same instance I'd say that you can use as few or many Runtime Repositories as you wish.
    When on different instances I think it's necessary to create them.
    Hopefully other forum-attendees can add some more if they have definite answers.
    Cheers, Patrick

  • Cloning use the different gcc version between source system and target sys

    Hi All,
    Our system is: Application tier and Database tier is split to two servers.
    We should run a cloning, but I found the different gcc version on application tier on source system and target system.
    The source application tier server is RedHat Linux ES3, gcc version is 3.2.3
    The target application tier server is RedHat Linux ES3, gcc version is 2.9.6
    There is the same gcc version on database tier on source system and target system, they are gcc 2.9.6.
    My question: Can I use the different gcc version between source system and target system when I run an erp cloning?
    Thanks & Regards
    Owen

    Not necessarily, you might get some errors if the version is higher and it is not supported by the OS. An example is Note: 392311.1 - usr/lib/gcc/i386-redhat-linux/3.4.5/libgcc_s.so: undefined reference to 'dl_iterate_phdr@GLIBC_2.2.4'
    To be on the safe side, make sure you have the same version (unless you want to give it a try).

  • Difference between database design and schema design

    Hi i have visited so many database websites and i found so many people saying we can design a data base for you. Is schema designing and database designing is the same. so many palces i find people saying we have to design data base first in order to create a physical databse. so i am little bit confused. are they same? and also what is the difference between data model and schema?

    > the definition i found for logical data model, physical data model and the definition you
    gave for logical database design, physical database design are the same.
    Not correct. The physical design is the implemetation of the logical design. These two designs are at different levels. Also, the logical design will be the same. irrespective of the RDBMS product use.
    What is incorrect is a designer/architect designing a logical design specifically for Oracle.. or specifically for SQL-Server. A logical design has nothing to do with the RDBMS product (or h/w platforms. app servers, web severs and operating systems used).
    So the logical design will always be the same - it is RDBMS independent.
    The physical design is fully dependent on the RDBMS product used. The same logical design will be implemented as different physical designs for Oracle and for SQL-Server.

  • Difference between WEP, WPA, and WPA2 and better suggestion to use for shared family users

    What is the difference between WEP, WPA, and WPA2? My router is set up on my family PC and connected to a modem so I access Wi-fi through my laptop and my sister has a laptop too and uses our family network to get internet. I just set up a WPA today, so will we all be able to get internet (along with my family using the pc, and my sis on her laptop, even at the same time) protected? (like nobody else using our network)

    Wired Equivalent Privacy, commonly called WEP is 802.11's first hardware form of security where both the WAP and the user are configured with an encryption key of either 64 bits or 128 bits in HEX. So when the user attempts to authenticate, the AP issues a random challenge. The user then returns the challenge, encrypted with the key. The AP decrypts this challenge and if it matches the original the client is authenticated. The problem with WEP is that the key is static, which means with a little time and the right tool a hacker could use reverse-engineering to derive the encryption key. It is important to note that this process does affect the transmission speed.
    WPA builds upon WEP, making it more secure by adding extra security algorithms and mechanisms to fight intrusion.
    WiFi Protected Access (WPA) is the new security standard adopted by the WiFi Alliance consortium. WiFi compliance ensures interoperability between different manufacturer’s equipment.WPA delivers a level of security way beyond anything that WEP can offer, bridges the gap between WEP and 802.11i networks, and has the advantage that the firmware in older equipment may be upgradeable.
    WPA2 is based upon the Institute for Electrical and Electronics Engineers’ (IEEE) 802.11i amendment to the 802.11 standard, which was ratified on July 29, 2004. The primary difference between WPA and WPA2 is that WPA2 uses a more advanced encryption technique called AES (Advanced Encryption Standard), allowing for compliance with FIPS140-2 government security requirements. 

  • Difference between dynamic actions and user exit

    Hi,
    Please help me in when to use table T588z and user exit to write code for dynamic actions.
    Thanks,
    Venkat

    Hi Prasad,
    Find the difference between Dynamic action and user exits.
    Dynamic Action                                              User Exits
    1. Here only initialization of an infotype                    1. Along with initialization of an infotype,                  depending upon other infotype                                    validation also can be done like in
        can be done.                                                        IT 16 the contract end date can not be
                                                                                    entered more than 6 months.
    2. Less time consuming to write.                             2. Require programming approch so more
                                                                                    time consuming.
    3. Table T588Z                                                       3. PBAS0001
    Br/Manas

Maybe you are looking for