You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 46 Next »

Status

  Approved

OwnerBIDALIA-ext, Kuldeep 
Stakeholders
Jira Request ID

ERP-167 - Getting issue details... STATUS

Jira Development ID

ERP-512 - Getting issue details... STATUS

High- Level Specification

ParameterValue
Application SystemS/4Hana ROW, S/4Hana China, S/4Hana CUI
Business Process Reference

10.02.01.01. Manage Project/WBS Changes

10.01.03.01. Manage Initiatives and Items

Functional Overview

Standard fields "Person Responsible No." and "Applicant No." are utilized in Project Definition and Work Breakdown Structure (WBS) elements of a project to track accountability and facilitate project-related notifications & workflows. Given that standard fields are maintained through manual configuration. In Syway design , it is intended to use Position numbers in this table based on the roles assigned. This means-

  • HR positions assigned to specific Security Roles via SAP User IDs will be designated as the responsible entities at the PPM Item, Project Definition and WBS element levels.
  • It supports organizational continuity, as responsibilities are tied to HR Position rather than individuals- reducing the need for manual updates when personnel changes occur.

Scope and Objectives

Scope- This enhancement defines a scheduled batch job that extracts HR positions based on their Security Role assignment and updates-

  1. Person Responsible No. Table: Populated with positions linked to Security Roles ‘Person Responsible - Project’, ‘Person Responsible - WBS’
  2. Applicant No. Table: Populated with positions linked to Security Role ‘Project Financial Controller’.

Objective- The key objective is to auto populate the Person Responsible and Applicant tables with relevant Positions based on relevant Security Roles.


Process Flow Diagram

Process steps are-

Step

Description

Comment

1Assign HR Position to a SAP User IDExisting active HR Position is assigned to a SAP User ID/s
2Assign Security Role to SAP User IDAssign Security Role e.g. ‘Person Responsible - Project’ OR ‘Person Responsible - WBS’ OR 'Project Financial Controller' to SAP User ID/s
3Execute Batch Job manually

Position will be derived based upon the defined Security Role assignment to the SAP User ID. Person Responsible No. or Applicant No. table will be appended as-

  1. Positions derived via Security Roles ‘Person Responsible - Project’ OR ‘Person Responsible - WBS’ is assigned then Person Responsible No. table will be updated with new record.
  2. Positions derived via Security Role ‘Project Financial Controller’ is assigned then Applicant No. table will be updated with new record.
4Check Positions available in Project Definition and WBS elements

Open a project and select project definition/ WBS element-

If Security Roles ‘Person Responsible - Project’ OR ‘Person Responsible - WBS’ is assigned to the Position via SAP User ID then search the Position in the Person Responsible No. field.

If Security Role ‘Project Financial Controller’ is assigned to the Position via SAP User ID then search the Position in the Applicant No. field.

5Check Positions available in the PPM Item

Open an PPM Item-

If Security Roles ‘Person Responsible - Project’ OR ‘Person Responsible - WBS’ is assigned to the Position via SAP User ID then search the Position in the Project Owner field.

If Security Role ‘Project Financial Controller’ is assigned to the Position via SAP User ID then search the Position in the Project Financial Controller field.

Assumptions

  • The system will have predefined and stable Security Role. Security Roles like ‘Person Responsible – Project’, ‘Person Responsible – WBS’, and ‘Project Financial Controller’ are expected to be consistently active. These Security Role name could vary based on Syensqo's nomenclature standards. 
  • One Position will be assigned to a single user.
  • HR positions do not have direct security role assignments.
  • HR position master data will be maintained in SAP S/4HANA with defined validity periods.

Dependencies

  • HR master data must be up to date i.e. Positions must be assigned to relevant Personnel Nos.
  • Table structures for Person Responsible No. and Applicant No. must allow maintenance via Batch Job without creating Transport Request.
  • Given that HR Position is Tier-1 master data, they will be replicated across all instances along with its associated infotypes.
  • An interface will be developed to replicate entries from the Person Responsible and Applicant tables into cross-instance tables.

Security, Integrity and Controls

  • Authorization Checks: Batch job runs under a technical user with write access to Person Responsible No. and Applicant No. tables.

Configuration Requirements

N/A

Language Requirements

N/A

Special Requirements

N/A


Design Rationale

Functional Requirements

The proposed batch job must fulfill functional requirement to ensure accurate, Security Role based HR Positions via SAP User ID are available and extracted for the project governance.

Once extracted, the batch logic must filter positions based on Security Role: positions linked to "Person Responsible- Project", "Person Responsible- WBS" Security Roles must be inserted or updated in the Person Responsible table, while those linked to the Project Financial Controller Security Role must populate the Applicant table. 

Additionally, the batch job must log all successful and failed updates, capturing metadata such as timestamp, record ID, and error type to support audit traceability. 

Proposed Technology to Use

N/A

Data Source Considerations

N/A

TableField NameComments/Calculation/Field Manipulation
HRP1001OBJIDField for picking Personnel No. (OTYPE = P) and Position (OTYPE = S) 
AGR_USERSUNAMESource for SAP User ID based on Security Roles
HRP1000MC_STEXTSource for Position Text

Data Validation Considerations

  • Data Validation: Position IDs are validated for active status before update.
TableField NameComments/Calculation/Field Manipulation
HRP1001BEGDAThe system date must be on or after the start date
HRP1001ENDDAThe system date must be earlier than the end date
HRP1014REDUNObsolete indicator must not be assigned to the Position

Custom Tables

N/A

Master Data

N/A

FieldDescriptionData Type/LengthValidation rule/ Value Help








Configuration Table

Configuration tables TCJ04 (for Person Responsible No.) and TCJ05 (Applicant No.) will be maintained via Batch Job without creating Transport Request.

FieldDescriptionData Type/LengthValidation rule/ Value Help

TCJ04-VERNR

Pers.Resp.No.NUMC/ 8

Filled by derived Position IDs 

TCJ05-ASTNRApplicant no.NUMC/ 8Filled by derived Position IDs

Selection Screen Enhancement

Field NameDescription

Select:

Data Type/LengthDefault Value/ Validation rule/ Value HelpSelection Logic
AGR_NAMERoleParameterCHAR/ 30

TCJ04 specific security roles-

Person Responsible- Project

Person Responsible- WBS

Multiple Roles can be selected
AGR_NAMERoleParameterCHAR/ 30

TCJ05 specific security role/s-

Project Financial Controller

Multiple Roles can be selected

Processing Logic

This enhancement is initiated through a daily batch job to ensure that Job based positions are consistently maintained within the TCJ04 & TCJ05 tables, sequence is-

  1. Identify Person Responsible Positions

           Pick all active Positions based on TCJ04 specific Security Roles-

a. Assign the TCJ04 specific security roles to the field AGR_USERS-AGR_NAME, and retrieve all SAP users AGR_USERS-UNAME whose validity period is active i.e., the current date falls between the latest start date (AGR_USERS-FROM_DAT) and end date (AGR_USERS-TO_DAT).

b. Retrieve the User ID and determine the active Personnel Number from table PA0105. Pass the User ID to field PA0105-USRID where PA0105-USRTY = 0001.

Ensure that the Personnel Number is active, i.e., the current date falls within the validity period defined by start date (PA0105-BEGDA) and end date (PA0105-ENDDA). Finally, and select the Personnel Numbers from field PA0105-PERNR.

c. Pass the Personal nos. to HRP1001-OBJID to get the active Position. Pass below information to HRP1001 to pick active position i.e. HRP1001-SOBID

OTYPE = P
OBJID = Personnel No.
PLVAR = 01
RSIGN = 008
Current date between Latest Start (BEGDA) and End date (ENDDA) to ensure Person to Position mapping is active
SCLAS = S
Pick SOBID

Pass the selected position to table HRP1014 and verify that the obsolete check is inactive i.e., field REDUN is blank or no corresponding record exists in HRP1014. Ignore Position if entry found.

d. Pick Position description from HRP1000- where     

OTYPE= S
OBJID= Position no.
Current date between Latest Start (BEGDA) and End date (ENDDA) to ensure Person to Position mapping is active
Pick MC_STEXT

List of Position IDs with Description will be collected, remove the duplicate entries if found.

            

        2. Identify Applicant Positions

          Pick all active Positions based on TCJ05 specific Security Role/s-

    1. Follow same steps as above for TCJ05 specific Security Role/s and collect Position IDs with Description.


          Note for step 1 & 2 : Alternatively, Find the Jobs assigned to the role and find the corresponding position of the jobs. ( logic to be determined post HR and Security role design)

       3. Select action-

  • Create
    • Person Responsible table

                      For TCJ04 specific Security Roles, Compare TCJ04 table entry with Step-1 data.

                      If new Positions are found in Step-1 data, then insert them as new Records in TCJ04 i.e. Position in VERNR and respective Position text in VERNA.

    • Applicant table

                     For TCJ05 specific Security Role/s, Compare TCJ05 table entry with Step-2 data.

                     If new Positions are found in Step-1 data, then insert them as new Records in TCJ05 i.e. Position in ASTNR and respective Position text in ASTNA.

  • Change-
    • Person Responsible table

                      For TCJ04 specific Security Roles, Compare TCJ04 table entry with Step-1 data.

                      If same Positions are found in both the tables, then update each Position text i.e. TCJ04-VERNA.

    • Applicant table

                     For Job i.e. HRP1001-SOBID = "TCJ05 specific Security Role/s", Compare TCJ05 table entry with Step-2 data.

                     If same Positions are found in both the tables, then update each Position text i.e. TCJ05-ASTNA.

  • Delete- Inactive Position

                     Get list of Positions from TCJ04 & TCJ05 tables and pass to HRP1000 to check inactive positions-

OTYPE = S
OBJID = Position
ENDDA is before system date

Also, get list of Positions from TCJ04 & TCJ05 tables and pass to HRP1014 to get obsolete positions-

OTYPE = S
OBJID = Position
REDUN = X

       Collect all positions from above 2 steps and delete the records from respective TCJ04 & TCJ05 tables.


Volumetrics

N/A


Performance Considerations

N/A


Error Handling

Monitoring and tracking of batch job (success or failure) and the ability to retrigger the batch job if needed.

Failed Batch jobs must be identifiable with exact reason of failure.

  1. If one Position has been derived from security roles i.e. "TCJ04 specific Security Role" and "TCJ05 specific Security Role/s", show error that "Position "00000000" have multiple Security Roles "Role 1", "Role 2", "Role 3" etc."
  2. The batch job log must display added and deleted positions from both TCJ04 and TCJ05 tables.


Testing

How to Test

Specific HR positions are required, and these positions are associated with SAP User IDs to which defined security roles are assigned.

Test Conditions and Expected Results

IDConditionExpected Result
1

Valid new Position assigned to SAP User ID having security role "Person Responsible- Project" or "Person Responsible- WBS"

Entry in Person Responsible table will be maintained after executing batch job manually. Open a project, new Position will appear in the Person Responsible field of Project Definition and WBS Element.

2

Valid new Position assigned to SAP User ID having security role "Project Financial Controller"

Entry in Applicant table will be maintained after executing batch job manually. Open a project, new Position will appear in the Applicant No. field of Project Definition and WBS Element.

3

Security Role to SAP User ID i.e. defined roles of Person Responsible and Applicant are not assigned 

No update in OPS6 or OPS7 after executing batch job manually

4

Change existing Position Description which is already maintained in either t-code OPS6 or OPS7

Position text will be updated after executing batch job manually. Open a project, Position updated text will appear in the Person Responsible search field of Project Definition and WBS Element. 

5

Position with mixed jobs i.e. "Person Responsible- Project"/ "Person Responsible- WBS" and "Project Financial Controller"

An error log will be generated by the batch job if the same position is attempted to be derived for both TCJ04 and TCJ05 entries.

6

Position with mixed jobs i.e. "Person Responsible- Project" and "Person Responsible- WBS"

Batch job will process and TCJ04 table will be maintained.

7

The position is inactive, or its validity period has already expired

Position will be deleted from OPS6 or OPS7 after batch job execution. 

When a project is opened that still references an inactive or expired position, the position will continue to display against the Project Definition and WBS element without triggering any error. If necessary, the position can be overwritten.

Test Considerations/Dependencies

  • The H2R team to allocate 10 positions to support the execution of the various tests outlined above.
  • The Security team to share user lists reflecting assignments to the roles "Person Responsible – Project", "Person Responsible – WBS", and "Project Financial Controller", in varying combinations for test validation.


Other Information

N/A

Development Details

Package

Package NameParent Package




Enhancement Implementation

Enhancement TypeStandard Definition NameCustom Implementation NameDesign Rationale Reference









Other Development Objects

Object TypeObject NamePurpose/High Level LogicDesign Rationale Reference








Appendix

Custom Authorization Group Naming Convention

This table is based on the Syensqo development standards document. It provides the naming conventions for authorization groups to associated with custom reports and tables to comply with security requirements.

ABAP

ZFIZMMZPSZCOZSDZBCZFIZCA
TABLESZFITZMMTZPSTZCOTZSDTZBCTZFITZCAT

See also


No files shared here yet.

Change log

Version Published Changed By Comment
CURRENT (v. 46) Dec 19, 2025 06:24 TORRES-ext, Benedict Security changes
v. 54 Dec 17, 2025 08:59 BIDALIA-ext, Kuldeep
v. 53 Dec 15, 2025 07:36 TORRES-ext, Benedict Additional assumption
v. 52 Dec 10, 2025 08:52 TORRES-ext, Benedict
v. 51 Dec 08, 2025 12:55 UPADHYAY-ext, Anjali
v. 50 Dec 08, 2025 12:43 UPADHYAY-ext, Anjali
v. 49 Dec 08, 2025 12:35 BIDALIA-ext, Kuldeep
v. 48 Dec 08, 2025 11:57 BIDALIA-ext, Kuldeep
v. 47 Dec 08, 2025 08:48 BIDALIA-ext, Kuldeep
v. 46 Dec 05, 2025 18:21 BIDALIA-ext, Kuldeep

Go to Page History

  • No labels