{"id":1870,"date":"2014-03-21T00:30:02","date_gmt":"2014-03-21T00:30:02","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=1870"},"modified":"2014-03-27T02:54:16","modified_gmt":"2014-03-27T02:54:16","slug":"pfl_check_directory","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/pfl_check_directory\/","title":{"rendered":"PFL_CHECK_DIRECTORY"},"content":{"rendered":"<p>Depending on the SAP version and release level, we can use function module PFL_CHECK_DIRECTORY to check whether a given SAP directory exists in SAP R\/3 system or not.<\/p>\n<p>The details about this function module\u00a0PFL_CHECK_DIRECTORY can be found using transaction code SE37 or SE80.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1872 aligncenter\" alt=\"\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/03\/img_532b8128486d6.png\" width=\"398\" height=\"289\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/03\/img_532b8128486d6.png 398w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/03\/img_532b8128486d6-300x217.png 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/03\/img_532b8128486d6-290x210.png 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2014\/03\/img_532b8128486d6-150x108.png 150w\" sizes=\"(max-width: 398px) 100vw, 398px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>As we can see, the various fields are Directory, Write_Check, Filname and Directory_long.<\/p>\n<p>&nbsp;<\/p>\n<table class=\"easy-table-creator tablesorter\" style=\"width: 100%;\">\n<thead>\n<tr>\n<th>\u00a0Parameter<\/th>\n<th>\u00a0Reference<\/th>\n<th>\u00a0Length<\/th>\n<th>\u00a0Default<\/th>\n<th>\u00a0Optional<\/th>\n<th>\u00a0Text<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>\u00a0DIRECTORY<\/td>\n<td>\u00a0BTCH0000-TEXT80<\/td>\n<td>\u00a080<\/td>\n<td><\/td>\n<td>\u00a0X<\/td>\n<td>\u00a0Name of directory<\/td>\n<\/tr>\n<tr>\n<td>\u00a0WRITE_CHECK<\/td>\n<td>\u00a0BTCH0000-CHAR1<\/td>\n<td>\u00a01<\/td>\n<td>\u00a0SPACE<\/td>\n<td>\u00a0X<\/td>\n<td>\u00a0Write authorization for directory<\/td>\n<\/tr>\n<tr>\n<td>\u00a0FILNAME<\/td>\n<td>\u00a0BTCH0000-TEXT80<\/td>\n<td>\u00a080<\/td>\n<td>\u00a0SPACE<\/td>\n<td>\u00a0X<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>\u00a0DIRECTORY_LONG<\/td>\n<td>\u00a0CHAR128<\/td>\n<td>\u00a0128<\/td>\n<td><\/td>\n<td>\u00a0X<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<tfoot>\n<tr>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<\/tfoot>\n<\/table>\n<div class=\"polyvision_credit_link\"><!--POLYVISION_CREDIT--><\/div>\n<p style=\"text-align: left;\"><span style=\"line-height: 1.5em;\">Exceptions:<\/span><\/p>\n<table class=\"easy-table-creator tablesorter\" style=\"width: 100%;\">\n<thead>\n<tr>\n<th>\u00a0Exceptions<\/th>\n<th>\u00a0Short Text<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>\u00a0PFL_DIR_NOT_EXIST<\/td>\n<td>\u00a0Directory does not exist<\/td>\n<\/tr>\n<tr>\n<td>\u00a0PFL_PERMISSION_DENIED<\/td>\n<td>\u00a0No write authorization for directory<\/td>\n<\/tr>\n<tr>\n<td>\u00a0PFL_CANT_BUILD_DATASET_NAME<\/td>\n<td>\u00a0Temporary file cannot be generated<\/td>\n<\/tr>\n<tr>\n<td>\u00a0PFL_FILE_NOT_EXIST<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<tfoot>\n<tr>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<\/tfoot>\n<\/table>\n<div class=\"polyvision_credit_link\"><!--POLYVISION_CREDIT--><\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Depending on the SAP version and release level, we can use function module PFL_CHECK_DIRECTORY to check whether a given SAP directory exists in SAP R\/3 system or not. The details about this function module\u00a0PFL_CHECK_DIRECTORY can be found using transaction code SE37 or SE80. &nbsp; &nbsp;&nbsp;<a class=\"read-more\" href=\"https:\/\/sapsecurityanalyst.com\/WP\/pfl_check_directory\/\">&hellip;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1870"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=1870"}],"version-history":[{"count":8,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1870\/revisions"}],"predecessor-version":[{"id":1882,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1870\/revisions\/1882"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=1870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}