Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

why we are assigining only 312 profiles to the user

Answer Posted / ravikanth dadi

The profile-to-user assignment is stored in table USR04; the relevant fields are BNAME (user name) and PROFS (list of assigned profiles).
The field PROFS has a length of 3750 characters and the first two characters are reserved for the user’s change flag ("C" = created, "M" = modified) plus a space character. The remaining 3748 characters hold the list of profiles names (12 characters reserved for each, shorter names are right-padded with spaces).

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Support types of WOs you have faced?

2307


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2657


Any details about secatt apart from SAPSecurity online.com?

2317


You want to remove a developer's and developer keys from a system. How would you do that?

1106


Explain internet-level security?

1149


Can you explain internet-level security?

1141


what is user base in sap security?

1725


How to run the daily background job s for virsa violations ? thabks in advance

3662


How do you check background jobs?

1195


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

4270


What is sap cryptographic library?

1078


What is the use of tmssup* rfc destinations?

2616


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2359


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2352


How can sap security be improved?

1129