What do you mean by User Buffer? How it works with the user's
Authorizations?
Answers were Sorted based on User's Feedback
Answer / goli
When a user logs on to the SAP R/3 System, a user buffer is
built containing all authorizations for that user. Each
user has their own individual user buffer. For example, if
user Smith logs on to the system, his user buffer contains
all authorizations of role USER_SMITH_ROLE. The user buffer
can be displayed in transaction SU56.
A user would fail an authorization check if:
* The authorization object does not exist in the user
buffer.
* The values checked by the application are not assigned to
the authorization object in the user buffer.
* The user buffer contains too many entries and has
overflowed. The number of entries in the user buffer can be
controlled using the system profile parameter
auth/number_in_userbuffer.
Is This Answer Correct ? | 24 Yes | 1 No |
Answer / apparao
user buffer is spaace where in there is info of what a user
can access..
i.e. all object class,authorization object , field and
values are present in this user buffer.
this can be accessed by t-code su56.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / lucky
The number of entries in the user buffer can be
controlled using the system profile parameter
Auth/auth_number_in_userbuffer
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / vamshi krishna
user buffer is spaace where in there is info of what a user
can access..
i.e. all object class,authorization object , field and
values are present in this user buffer.
this can be accessed by t-code su53.
Is This Answer Correct ? | 4 Yes | 22 No |
What is sap cryptographic library?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
How to restrict Table access in SAP?
How to restrict a newly created program ?
What is the difference between c (check) and u (unmaintained)?
What is sso in sap security?
Whay can't you assign a composite role to another composite role ? Need clear explaintion.
What is the difference between Execution and Simulation in grc rar
Differentiate between temp role and copy role
what is the procedure to delete a role?
6 Answers Cap Gemini, IBM, iGate,
What's the use of Detour path? How Fork path differs from Detour path
What does the pfcg_time_dependency clean up?