What do you mean by User Buffer? How it works with the user's
Authorizations?
Answers were Sorted based on User's Feedback
Answer / goli
When a user logs on to the SAP R/3 System, a user buffer is
built containing all authorizations for that user. Each
user has their own individual user buffer. For example, if
user Smith logs on to the system, his user buffer contains
all authorizations of role USER_SMITH_ROLE. The user buffer
can be displayed in transaction SU56.
A user would fail an authorization check if:
* The authorization object does not exist in the user
buffer.
* The values checked by the application are not assigned to
the authorization object in the user buffer.
* The user buffer contains too many entries and has
overflowed. The number of entries in the user buffer can be
controlled using the system profile parameter
auth/number_in_userbuffer.
Is This Answer Correct ? | 24 Yes | 1 No |
Answer / apparao
user buffer is spaace where in there is info of what a user
can access..
i.e. all object class,authorization object , field and
values are present in this user buffer.
this can be accessed by t-code su56.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / lucky
The number of entries in the user buffer can be
controlled using the system profile parameter
Auth/auth_number_in_userbuffer
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / vamshi krishna
user buffer is spaace where in there is info of what a user
can access..
i.e. all object class,authorization object , field and
values are present in this user buffer.
this can be accessed by t-code su53.
Is This Answer Correct ? | 4 Yes | 22 No |
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
Which transaction should not be given to BASIS and DEV team in Production?
What are pfud t-codes used for?
Can anybody explain (short n simple) about SOX & SoDs with 3 examples for each functional module? n ur experience on SoDs.
what is the alternate tcode for su01?
Can you explain internet-level security?
what is the process to find that one consultant had removed a table from sap tables
Explain transport system-level security?
How to add a new tcode to 1000 roles at a time?
2 Answers Cap Gemini, Tech Mahindra,
What does SAP recommend regarding the RFC naming convention?
1.why we use derived role in sap security?2.what is the technical difference between master and derived role?
How to trace the Users in BI Security and give me navigation