Start of Content Area

Background documentation User Management  Locate the document in its SAP Library structure

User Types

It is often necessary to specify different security policies for different types of users. For example, your policy may specify that individual users who perform tasks interactively have to change their passwords on a regular basis, but not users who run background processing jobs.

The user types required for the Defense Forces & Public Security applications are:

·        Individual users:

¡        Dialog users are used for the following functions for the SAP GUI for Windows or RFC connections:

-   Personnel assignment

-   Human Resources infotypes

-   Qualification management

-   Management of flying hours

The other users are usually the same as the users listed for Human Resources. Note in particular the users for Personnel Management. For more information, see User Management.

You may want to differentiate users according to target and actual planning. This cannot be defined in the standard system, however, since it depends on your particular organization.

Standard Users

No particular standard users are provided for the Defense Forces & Public Security component. You are advised to divide up your users according to business-related processes. This means that you could define the following business-related user groups, for example:

·        The process of material assignment for a soldier or individual

You could further divide the user group by the following users:

¡        Users that are only responsible for the target planning (materials requirements in the organization on a job/position level)

¡        Users that are responsible for the actual planning and goods issue

·        The process of managing flying hours

User group for defining the annual flying hours program and recording the actual flying hours

·        The personnel development process

User group for defining the qualification block hierarchy, that is, the grouping of qualifications according to business criteria

Note

For master data maintenance, the guidelines in the Security Guide for Personnel Management (PA) apply.

.

 

End of Content Area