You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

Status

  Approved

OwnerSHARMA-ext, Meenakshi 
StakeholdersLaurence DANNET, Paulo Golinelli
Jira Request ID

ERP-134 - Getting issue details... STATUS

Jira Development ID

ERP-726 - Getting issue details... STATUS ERP-999 - Getting issue details... STATUS

High- Level Specification

ParameterValue
Application SystemS/4Hana ROW, S/4Hana China, S/4Hana CUI
Business Process Reference

03.04.06.01. Manage Invoice Receipt

03.04.06.03. Post Invoice

Functional Overview

A custom function module will be developed to validate incoming vendor invoices that are not associated with a Purchase Order (Non-PO invoices). The module will enforce the company’s “No PO, No Pay” policy by verifying whether the vendor is authorized to submit Non-PO invoices, allowing only limited exceptions. Non-PO invoices flagged as Not Allowed for Non-PO will be automatically rejected, except for credit memos or invoices originating from the OCR channel.

Scope and Objectives

The objective of this enhancement is to implement a functional control mechanism that automatically identifies and rejects Non-PO invoices submitted by vendors who are not authorized for Non-PO invoice processing as per the Vendor Master Data settings. This will ensure adherence to company policy, improve invoice validation accuracy, and reduce manual intervention.

This functional module will have:

  1. Validation Logic

    • Check all incoming invoices to determine whether they are Non-PO invoices.

    • Cross-reference each Non-PO invoice with the Vendor Master Data to verify if the vendor is flagged as allowed for Non-PO invoices.

  2. Exception Handling

    • If the vendor is not allowed for Non-PO invoices:

      • The system will auto-reject the invoice.

      • The rejection will apply only if:

        • The source input channel is not OCR (Optical Character Recognition), and EDICOM

        • The invoice is not a credit memo.

  3. System Behavior

    • For invoices meeting the exception criteria (vendor not allowed, not from OCR, and not a credit memo), the system will automatically:

      • Flag the invoice as “Rejected – Non-PO not allowed for vendor”.

      • Send rejection status to source Portal

      • Terminate the workflow
  4. Audit and Reporting

    • Maintain a log or report of all invoices auto-rejected under this rule, rejection reason, and timestamp, for audit and compliance purposes.

Process Flow Diagram


Step

Description

Comment

1Receive Invoice Without PO ReferenceInvoices without PO can be received through various input channels, including Email, Supplier Portal, SAP Business Network, IDoc, and EDICOM.
2Check If Invoice Vendor Is Allowed For Non-POValidate whether the invoice vendor is authorized for Non-PO processing based on the Vendor Master Data and flag as 'Not Allowed For Non-PO' if vendor is not authorized for Non-PO.
3Check Transaction Type and Source ChannelValidate that the flagged invoice’s source channel is neither OCR nor EDICOM, and that the transaction type is not a credit memo.
4Trigger Auto RejectionTrigger Auto Rejection using RTV if invoice’s source channel is neither OCR nor EDICOM, and that the transaction type is not a credit memo.
5Manual Exception HandlingInvoice flagged as 'Not Allowed For Non-PO' will undergo manual review by Account Payable accountants if invoice’s source channel is either OCR or EDICOM, and that the transaction type is a credit memo.


Assumptions

Dependencies

Security, Integrity and Controls


Configuration Requirements

Language Requirements

Special Requirements


Design Rationale

Functional Requirements

Proposed Technology to Use

Data Source Considerations

TableField NameComments/Calculation/Field Manipulation











Data Validation Considerations

TableField NameComments/Calculation/Field Manipulation













Custom Tables

Master Data

FieldDescriptionData Type/LengthValidation rule/ Value Help









Configuration Table

FieldDescriptionData Type/LengthValidation rule/ Value Help








Selection Screen Enhancement

Field NameDescription

Select:

Data Type/LengthDefault Value/ Validation rule/ Value HelpSelection Logic













Processing Logic



Volumetrics


Performance Considerations



Error Handling


Testing

How to Test

Test Conditions and Expected Results

IDConditionExpected Result










Test Considerations/Dependencies


Other Information


Development Details

Package

Package NameParent Package




Enhancement Implementation

Enhancement TypeStandard Definition NameCustom Implementation NameDesign Rationale Reference









Other Development Objects

Object TypeObject NamePurpose/High Level LogicDesign Rationale Reference








Appendix

Custom Authorization Group Naming Convention

This table is based on the Syensqo development standards document. It provides the naming conventions for authorization groups to associated with custom reports and tables to comply with security requirements.

ABAP

ZFIZMMZPSZCOZSDZBCZFIZCA
TABLESZFITZMMTZPSTZCOTZSDTZBCTZFITZCAT

See also


No files shared here yet.

Change log

Version Published Changed By Comment
CURRENT (v. 6) Dec 02, 2025 15:43 SHARMA-ext, Meenakshi
v. 14 Dec 01, 2025 15:30 SHARMA-ext, Meenakshi
v. 13 Dec 01, 2025 15:04 JOUHAUD-ext, Yoann
v. 12 Nov 27, 2025 17:00 JOUHAUD-ext, Yoann
v. 11 Nov 26, 2025 09:53 SHARMA-ext, Meenakshi
v. 10 Nov 21, 2025 09:17 SHARMA-ext, Meenakshi
v. 9 Nov 20, 2025 14:20 SHARMA-ext, Meenakshi
v. 8 Nov 19, 2025 17:14 SHARMA-ext, Meenakshi
v. 7 Nov 19, 2025 17:11 SHARMA-ext, Meenakshi
v. 6 Nov 19, 2025 17:01 SHARMA-ext, Meenakshi

Go to Page History

  • No labels