Security Profiles - Difference between SYSTEM and TENANT admin user?

Hi,
In the OnDemand Enterprise workbook, some defualt security profiles have been configured.  This includes one called 'Tenant Admin'.   When I look in the system there is also a profiule called 'System Admin'.  Could somebody please explan the differences between system and tenant regarding these profiles?   I assume we shoul drarely use System Admin, and Tenant Admin is the safer option?
Thanks
John

Hi,
As you mentioned there are 2 status can be maintained for documents like Equipment Master, Notification, Maintenance Order & other important business documents.
In case, client feels that system status is not enough to capture the details of the object, then user status can be used.
System statuses will be updated automatically based on business transactions which will be done on SAP.
For example, once the equipment is created, System status would CRTD (Created). If you install the same to some superior equipment or FL, then status would be INST (Installed).
If you keeping that equipment in Spare, then for that, you have to maintain separate User Status like AVLB (Available in Stock / Spare) so that through IH08, by using User status, you can the report which is available as spare.
These user status as per the name, should be updated by the user manually.
Regards,
Maheswaran.

Similar Messages

  • Difference between read and view only -users having both permissions can download the documents

    Hi All,
     Would like to know whats the difference between view only and read permission.
    As per my requirement, my end users who have been assigned View Only should NOT be able to Download the document from a doc lib.Whereas who have Read permissions should be able to download.
    But when i tested with few users with these  permissions, those users who are having  viewonly permissions was able to  download the documents.
    how this will be true? MS says that this is not possible if it contains server side handlers.
    my customer worried about the  download-the-document part. as per them end users who have  view only permissions should not download the docs.

    Hi,
    Please check this similar thread:
    https://social.technet.microsoft.com/Forums/sharepoint/en-US/4b21a168-443b-45d3-940c-fe52e8538290/how-to-protect-sharepoint-document-not-allow-to-download?forum=sharepointadminprevious
    Your only option is to implement IRM to accomplish your requirement.
    Nico Martens
    SharePoint/Office365/Azure Consultant

  • What is the difference between sGWI and cGWI to user ?

    What difference does Server Groupware integration (sGWI) and Client Groupware integration  (cGWI)  have on the end user? Is there any documentation that explains the difference and how to make the choice to deploy one or the other  ?
    What actualy does an end user get with sGWI ?
    Many thanks
    M

    Hello,
    There is a major difference between the sGWI and the cGWI, obviously the server intergration part but your question is not concerning that.
    From an end user perspective the difference is also very obvious.
    In the cGWI the end user needs to trigger the synchronization manually, the end user can control what is synchronized and what not (a popup with the changes is presented on each synchro where the user still can decide whether to synchro or not).
    Additional software must also be installed on each individual PC.
    In the sGWI the end user has no control on the synchro process, also, the synchro process is completely invisible to the end user. The end user has no influence over what and how it is synchronized.
    Documentation (I'm talking about 2007/7.0/7.0 Enhp1) is available here:
    https://websmp209.sap-ag.de/~sapdownload/011000358700000816082011E/Client_GWI.pdf
    https://websmp209.sap-ag.de/~sapdownload/011000358700000429612011E/ClientGWIInstallationGuide.pdf
    Don't have any direct links for the sGWI...
    Hope this helps,
    Kind regards,
    Joost Stallaert

  • Difference between XVBAK and YVBAK in user exits

    Hi can any body say why the two internal tables XVBAK and YVBAK in user exits? where did they come from? please do respond me.
    Regds
    Harish

    XVBAK is new values
    YVBAK is old values
    generally if you change any values in VA02 (sales order change).then xvbak , and yvbak will be populated with new and old respectively.
    Regards
    vijay

  • Difference between Filter and Variables

    Hi Experts,
    What is the difference between Filter and Variables except user can give input dianamically in the case of Variables??
    Thanks in Advance!
    Sapna

    HI,
    Both works similarly ....but if the requirement is fixed means u know what data should be displayed in the query then u can use the filters....if u want to give that option to the Users then we create a variable and user can enter the required data which he wants to view.....once u define filters then only that particular restricted data will be displayed in the query out put....but incase of variables we are having the flexibility to view the data....
    Thanks/Tarak

  • Activity System status: differences between u0093Openu0094 and u0093In processu0094 status

    Dear Experts,
    What’s the difference between “Open” and “In process” system status? In help.sap.com it: “There are four system statuses that represent the life cycle of the business transaction:
    • Open: has been recently created and not yet processed (for example, contract from the Internet)
    • In process: administrator is clearing up questions”
    But, how does the system assumes the “In Process” status ?? I‘ve tested business activities creation with different employees assigned and, when editing and saving the business activities with these BP’s the system status does not change.
    However, in other “unknown” situations the status system is changed to “in Process”.
    Any ideas about the meaning of the “In Process” status? And when the business activity switches to that?
    Thanks in advance,
    Joao

    Hi,
    These four system statuses that represent the life cycle of the business transaction:
    ·        Open: has been recently created and not yet processed (for example, contract from the Internet)
    ·        In process: administrator is clearing up questions
    ·        Released: contract is complete and legal. Follow-up processes can be started (printing, billing, distribution, releases and so on)
    ·        Completed: All actions directly linked to contract are completed
    ·        Closed: all actions indirectly linked to the contract are closed (for example, from R/3: batch run to actual costs)
    Each status having its own control at the configuration level. If you observe the following process you may understand the importance of various statuses.
    For example in any transaction by default status would be Open. Once the transaction opened by the respective responsible person he will change the status as In Process, Once the assigned task is completed he will change the status as Completed.
    Please notice the configuration settings in the following navigation path:
    SPRO->IMG->CRM->Transactions->Basic Functions->Status Management-> Change Status Profile for User Status->Select Quotation->Double click on the different status. You can observe the difference.
    Hope I convinced.
    Best Regards,
    Johnny.
    Reward if it helps.

  • Difference between system copy and Remote Client copy?

    Hi,
    Can any body suggest me , What are the major difference between System copy and Remote Client Copy.
    As per my knowledge , Both are different
    1.In system copy  entire data recovered mean copy from Source to target
    2.In Remote client copy All  Client data can't me import if you choose SAP_ALL profile also
          I hope Transaction data and user data can't copied
    Anybody share this Question and Give me some idea about this
    If anybody  give brief explanation that is very gratefull.
    regards,
    Balaram

    Hi,
    System copy will replicate all database from source to target system.
    In remote copy only client in which you are performing the copy will get refresh. Also, remote client copy will be done between systems on same patch level. with SAP_ALL profile you can bring all data in target system including your transactional data.
    Thanks
    Sunny

  • Difference between system refresh and client refresh

    Hi all,
         I have one dout what is the difference between system refresh and client refresh,kindly tell me the answer?
    BR
    krishnamurthy.

    Hi,
    Client is part of a system.
    Client copy :Can happen within a single system(local client copy)  or to other system (i.e b/w systems) .
    Here we have some profiles to extract the data depending on the need.
    System Copy: We are copying the entire system to other system.we get the entire systems data (DB) .
    In both the cases we have to make sure that they are on same application component and are on same patch level.
    Thanks!!
    Edited by: Vani n on Jun 27, 2008 2:45 PM

  • The difference between system restore and last good known configuration

    hi,
    what is the difference between system restore  and last good known configuration.
    in which situation you use system restore ,and in which situation you use last good known configuration.
    very short answer wil be enough.
    thanks
    johan
    h.david

    Last Known Good Configuration deals only with Starting Windows eg. a bad registry or incorrect driver is preventing Windows to start.It recovers the registry settings of HKEY_LOCAL_MACHINE\System\CurrentControlSet
    While System Restore uses restore points to return your system files and settings to an earlier point in time without affecting personal files. Restore points are created automatically every week, and just before significant system events, such as the installation
    of a program or device driver. You can also create a restore point manually.You can undone system restore but there is no such option in Last Known Good Configuration.
    Last Known Good Configuration is disabled in Windows 8 or,Windows 8.1 by default.
    Try using Last Known Good Configuration if you can't start Windows, but it started correctly the last time you turned on the computer.
    Try using System Restore to return the system to an earlier point in time when things worked correctly.
    S.Sengupta, Windows Entertainment and Connected Home MVP

  • What's the security difference between WPA and WPA2 Personal?

    In order to get my G4 iMac (OS 10.4.11) onto my new AEBS(b/g/n) wi-fi network, I had to drop the network security down from WPA2 Personal to WPA/WPA2 Personal.
    What are the potential security risks in this mode? I know that WEP is no longer secure, so I'm concerned about WPA also being vulnerable.
    If there's a good online explanation of these security differences (not necessarily Apple-only), you just give me that link.
    Thanks

    Hi,
    Summary:
    1.WPA2 is the improved version of WPA
    2.WPA only supports TKIP encryption while WPA2 supports AES
    3.Theoretically, WPA2 is not hackable while WPA is
    4.WPA2 requires more processing power than WPA
    http://www.differencebetween.net/technology/difference-between-wpa-and-wpa2/

  • Differences between System.gc() and Runtime.gc() ?

    differences between System.gc() and Runtime.gc() ?

    None!
    P.S. I have only found one reason to use System.gc(). For some obscure reason it seems that if one invokes System.gc() when a Swing application is about to be iconized it substantially reduces the delay experienced when de-iconizing the application!
    Several reasons for this have been suggested but I have found none that really explain why it works but it does work!
    Edited by: sabre150 on Sep 28, 2007 10:23 AM

  • Differences Between Object And System Privileges

    Hi,
    Whats the difference between object and system privileges in oracle?
    Cheers
    Paul

    System Privileges
    A system privilege is the right to perform a particular action, or to perform an action on any schema objects of a particular type. For example, the privileges to create tablespaces and to delete the rows of any table in a database are system privileges.
    Schema Object Privileges
    A schema object privilege is a privilege or right to perform a particular action on a specific schema object:
    For example, the privilege to delete rows from the departments table is an object privilege.
    Some schema objects, such as clusters, indexes, triggers, and database links, do not have associated object privileges. Their use is controlled with system privileges. For example, to alter a cluster, a user must own the cluster or have the ALTER ANY CLUSTER system privilege.
    A schema object and its synonym are equivalent with respect to privileges. That is, the object privileges granted for a table, view, sequence, procedure, function, or package apply whether referencing the base object by name or using a synonym.
    Granting object privileges on a table, view, sequence, procedure, function, or package to a synonym for the object has the same effect as if no synonym were used. When a synonym is dropped, all grants for the underlying schema object remain in effect, even if the privileges were granted by specifying the dropped synonym.

  • DIfference between BW and R/3 Security

    Hi
    Please tell me whats the difference between BW and R/3 Security
    Thanks

    Hi,
    The main difference is that, in R/3 the first line of defence it S_TCODE, i mean its completely based on Transaction.
    Where as B/W is completely object based i.e, it deals with securing Infoobjetcs, Infocubes, ODS, BW Queries, etc....
    For more ingormation on BW Seecurity, please visit:
    http://www.*********************/bw_security/bw_security.htm
    Hope it helps.
    Please award points if it is useful.
    thanks & regards,
    santosh

  • What are the differences between tracing and hierarchical profiler?

    There are many terms used by people, I am just wondering what are the differences between tracing and hierarchical profiler? Aren't they the same thing?
    Thanks a lot.

    Instrumentation and tracing are two different things; in fact they belong to two different categories - one's a thing the other's an activity.
    Tracing is following the execution path of a program. Tracing shows us the the calls a program makes, perhaps the internal choices it makes (ifs and whiles), exceptions thrown, etc,
    Instrumentation is code we build into our program to produce a record of its status. There are different techniques, from using DBMS_APPLICATION_INFO calls to monitor status to writing log tables or files. Instrumentation can be used to generate a trace; it can do profiling; it can provide information reports on outputs and exceptions.
    In my opinion DBMS_TRACE and DBMS_HPROF are not instrumentation, because they are external to the program under investigation, rather than built into it. However, there is an obvious overlap between the insight they provide and what we might do with our own logging.
    Cheers, APC
    PS
    970992 wrote:
    you are not a stranger for me.Really? I don't believe we've met. I'm pretty certain I don't know anybody whose name is just a number.

  • Differences between archiving and inactivating a qualitative lookup within the Data Admin toolkit.

    Hi,
    Can you please let me know what could be the difference between archiving and Inactivating the Qualitative Lookup in Data Admin Tool Kit.
    Thanks,
    Rohini M

    When you inactive or archive something it is no longer available for selection.   The difference between inactive and archive is that inactive items will still appear available for searching purposes while archive items will not.  
    So lets say you have the following:
    List A
       - Item 1
       - Item 2
    List Items
    If you were to inactivate Item 1, end users would no longer see it available for selection when using the qualitative extended attribute.  However when they search for specs based on the extended attribute they would still be able to select Item 1 so they could find objects that used that value. If you were to archive Item 1, end users should no longer see it available for selection anywhere - including searching.
    Lists
    If you were to inactive or archive the entire List A, you would no longer see it available for selection when setting up qualitative lookup extended attributes.   I don't think there is anywhere you can search for extended attributes by lookup list currently out of the box so these would act similar.  If there was a place to search for extended attributes by lookup list then it would follow the same rules as above.

Maybe you are looking for