Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

what is the length of user buffer

Answer Posted / muthu

I hope there is no limit for user buffer now a days. N.no of authorization can perform a user.

Is This Answer Correct ?    0 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what is the difference between usobt_c and usobx_c?

1312


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2285


What is the procedure for role modifications?

1117


When would you update a sap table directly? What precautions would you taje?

1168


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1283


How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?

1146


How to find out who has deleted users in the system?

1111


How to run the daily background job s for virsa violations ? thabks in advance

3621


What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

1457


what is the main difference between the derived role and a single role?

1106


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2675


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2295


Can wildcards be used in authorizations?

1171


Is it possible to have more than one st of org-level values in one role? Explain your answer.

1060


What is sap’s grc?

1143