How many maximum profiles we can assign to one user?

Answer Posted / vinod kumar s

The table USR04 contains the User master authorizations.

In this table the field XUPROFS contains the profiles whose
size is 3750 characters.
it also hold the change status of the user with 4
characters.
Each profile conains 12 characters
so number of profiles = 3750-4/12

nearly 312

I hope the answer is clear for you

Is This Answer Correct ?    16 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what are all the questions covered in "profiles related concepts " please let me know ?

1634


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

1874


You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?

734


Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.

1800


can you please send me SAP Security upgrade documents and guide for CRM 5 and CRM 7 and what are the differeces between crm 5 AND crm 7 according to sap security point of view.

2280






What is Sap security t-codes?

720


What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

994


Explain transport system-level security?

650


what are the issues you faced with UME?

2456


Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2136


Can you explain network topology in sap systems?

629


How we Educated client personnel in R/3 Security and general Basis knowledge

1803


What is the difference between c (check) and u (unmaintained)?

1099


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

1858


How to assign any program to user?

1066