How many maximum profiles we can assign to one user?
Answer Posted / vinod kumar s
The table USR04 contains the User master authorizations.
In this table the field XUPROFS contains the profiles whose
size is 3750 characters.
it also hold the change status of the user with 4
characters.
Each profile conains 12 characters
so number of profiles = 3750-4/12
nearly 312
I hope the answer is clear for you
Is This Answer Correct ? | 16 Yes | 0 No |
Post New Answer View All Answers
what are all the questions covered in "profiles related concepts " please let me know ?
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.
What is Sap security t-codes?
What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?
Explain transport system-level security?
what are the issues you faced with UME?
Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.
Can you explain network topology in sap systems?
How we Educated client personnel in R/3 Security and general Basis knowledge
What is the difference between c (check) and u (unmaintained)?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
How to assign any program to user?