Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What do you mean by User Buffer? How it works with the user's
Authorizations?

Answer Posted / apparao

user buffer is spaace where in there is info of what a user
can access..

i.e. all object class,authorization object , field and
values are present in this user buffer.

this can be accessed by t-code su56.

Is This Answer Correct ?    3 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What appears as the last sentence in sap note 587410?

1059


Any details about secatt apart from SAPSecurity online.com?

2314


Which tables will you use for making customizing setting for security administration?

1159


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2647


In pfcg where we can add customized t-codes. And where we can see customized t-codes

1686


Can you explain transport system-level security?

1243


How do I change the name of master / parent role keeping the name of derived/child role same? I would like to keep the name of derived /child role same and also the profile associated with the child roles.

1377


Differentiate between saml token profile and a sap logon ticket

1394


Attributes in SE01?

2547


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4713


What is the difference between authorization object and authorization object class?

1132


when performing client copies what steps you need to take from CUA point of view?

2562


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2133


How to do Role Design, Testing and Implementation

2513


How to update risk id in rule set?

1157