What do you mean by User Buffer? How it works with the user's
Authorizations?
Answer Posted / goli
When a user logs on to the SAP R/3 System, a user buffer is
built containing all authorizations for that user. Each
user has their own individual user buffer. For example, if
user Smith logs on to the system, his user buffer contains
all authorizations of role USER_SMITH_ROLE. The user buffer
can be displayed in transaction SU56.
A user would fail an authorization check if:
* The authorization object does not exist in the user
buffer.
* The values checked by the application are not assigned to
the authorization object in the user buffer.
* The user buffer contains too many entries and has
overflowed. The number of entries in the user buffer can be
controlled using the system profile parameter
auth/number_in_userbuffer.
Is This Answer Correct ? | 24 Yes | 1 No |
Post New Answer View All Answers
How do you check background jobs?
Authorization check on s_btch_job failed. What would happen now?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.
Differentiate between saml token profile and a sap logon ticket
Can you anybody tell me what are the questions frequently asked 3 years of SAP Security experienced level in INFOSYS company.
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
Can wildcards be used in authorizations?
what is user base in sap security?
User is not there in User master record. Then how to trace the user?
A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?
Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'
What appears as the last sentence in sap note 587410? What does it men and how would you restrict it?
how we Set up Central User Administration (CUA) to manage 4 systems/clients
DOES ANYONE KNOW WHAT TYPES OF SECURITY QUESTIONS ACCENTURE ASKED IN USA....URGENT PLEASE