Status

OwnerSHARMA-ext, Meenakshi 
StakeholdersLaurence DANNET, Paulo Golinelli
Jira Request ID

Jira Development ID

High- Level Specification

ParameterValue
Application SystemS/4Hana ROW, S/4Hana China, S/4Hana CUI
Business Process Reference

03.04.06.01. Manage Invoice Receipt

03.04.06.03. Post Invoice

Functional Overview

A custom function module will be developed to validate incoming vendor invoices that are not associated with a Purchase Order (Non-PO invoices). The module will enforce the company’s “No PO, No Pay” policy by verifying whether the vendor is authorized to submit Non-PO invoices, allowing only limited exceptions. Non-PO invoices flagged as Not Allowed for Non-PO will be automatically rejected, except for credit memos or invoices originating from the OCR channel.

Scope and Objectives

The objective of this enhancement is to implement a functional control mechanism that automatically identifies and rejects Non-PO invoices submitted by vendors who are not authorized for Non-PO invoice processing as per the Vendor Master Data settings. This will ensure adherence to company policy, improve invoice validation accuracy, and reduce manual intervention.

This functional module will have:

  1. Validation Logic

    • Check all incoming invoices to determine whether they are Non-PO invoices.

    • Cross-reference each Non-PO invoice with the Vendor Master Data to verify if the vendor is flagged as allowed for Non-PO invoices.

  2. Exception Handling

    • If the vendor is not allowed for Non-PO invoices:

      • The system will auto-reject the invoice.

      • The rejection will apply only if:

        • The source input channel is not OCR (Optical Character Recognition), and EDICOM

        • The invoice is not a credit memo.

  3. System Behavior

    • For invoices meeting the exception criteria (vendor not allowed, not from OCR, and not a credit memo), the system will automatically:

      • Flag the invoice as “Rejected – Non-PO not allowed for vendor”.

      • Send rejection status to source Portal

      • Terminate the workflow
  4. Audit and Reporting

    • Maintain a log or report of all invoices auto-rejected under this rule, rejection reason, and timestamp, for audit and compliance purposes.

Process Flow Diagram


Step

Description

Comment

1Receive Invoice Without PO ReferenceInvoices without PO can be received through various input channels, including Email, Supplier Portal, SAP Business Network, IDoc, and EDICOM.
2Check If Invoice Vendor Is Allowed For Non-POValidate whether the invoice vendor is authorized for Non-PO processing based on the Vendor Master Data and flag as 'Not Allowed For Non-PO' if vendor is not authorized for Non-PO.
3Check Transaction Type and Source ChannelValidate that the flagged invoice’s source channel is neither OCR nor EDICOM, and that the transaction type is not a credit memo.
4Trigger Auto RejectionTrigger Auto Rejection using RTV if invoice’s source channel is neither OCR nor EDICOM, and that the transaction type is not a credit memo.
5Manual Exception HandlingInvoice flagged as 'Not Allowed For Non-PO' will undergo manual review by Account Payable accountants if invoice’s source channel is either OCR or EDICOM, and that the transaction type is a credit memo.


Assumptions

Describe any assumptions that have been made in the process of completing this design. What functionality is expected of configuration or other developments that pass information to this development and/ or retrieve the information processed by it (performance, triggers, exceptions, etc.)

Dependencies

Indicate any dependencies or constraints that may impact this development, in terms of requirements from internal or external applications, other work streams, time constraints, data or system access restrictions. Also, please specify scheduling or process dependencies, e.g. interface/batch job that must run beforehand or process steps that need to be completed prior to executing this development.

Security, Integrity and Controls

To detail the security requirements for processing this enhancement, any data integrity issues associated with the object and the teams that will be responsible for processing the object, i.e. authorization/roles required to who can execute the enhancements, etc.

- Custom Tables, enhancement, transaction codes, programs, Web Dynpro Application, Code Data Services (CDS), Open Data Protocol (OData), BI reports, and Functional Modules need to have at least one authority check either standard or custom. (custom should be an exception)

- All custom tables will be maintained in a certain Authorization Group (example: ZFIN, etc.)

- In the case of transaction codes an additional check other than the object S_TCODE is required. You can use SU24 to find the related authorization objects to check.

All other WRICEFs

- If the authorization check is already performed in the calling Programs, this section can be filled as “Follow calling programs authorization check” (example : BADI to redirect DMS to OpenText, in which the calling Manage Purchase requisition Fiori App already performed authorization check)

- If the authorization check is not checked in any of the development, this section should be filled with the proposed authorization check. You can refer to SU24 to see the standard authorization objects. (example: full custom Fiori App to enable user to download/upload the project plan)


Configuration Requirements

Specify the configuration requirements for this object. Like in case of substitution/ routine specify the configuration needed

Language Requirements

Specify the language requirements for this object. Specify the required language and type of translation, like labels, data.

Special Requirements

Specify any special requirements or considerations that may impact the enhancement based on specific locations, regulatory compliance or system limitations. Clearly outline requirements e.g. localization rules for countries like China

If the enhancement interacts with third-party systems such as Icertis, describe any additional integration, security or authentication considerations that must be taken into account.


Design Rationale

Functional Requirements

Detail the functional requirements that are desired to be achieved by the Enhancement compared to current functionality

Proposed Technology to Use

Typically, an enhancement will be based on an existing SAP BADI / user exit. If this is the case, please provide the proposed details of the BADI / user exit.

Data Source Considerations

Include an overview of the source

TableField NameComments/Calculation/Field Manipulation











Data Validation Considerations

Include an overview of the data validation requirement

TableField NameComments/Calculation/Field Manipulation













Custom Tables

If any custom configuration tables are required, which will be read by the enhancement logic, then specify them here.

Master Data

<Title Custom Table 1>

<Include an overview of the table and what it’s used for>

FieldDescriptionData Type/LengthValidation rule/ Value Help









Configuration Table

Title Configuration Table 1

Include an overview of the table and what it’s used for

FieldDescriptionData Type/LengthValidation rule/ Value Help








Selection Screen Enhancement

This section will give the details on the selection screen parameters, parameter type and whether it’s obligatory or not. This section can be used to define the Import Export parameters for Function Module or User Exit or Screens.

Field NameDescription

Select:

Option or Parameter

Check box or Radio button

Import or Export

Data Type/LengthDefault Value/ Validation rule/ Value HelpSelection Logic













Processing Logic

This section defines the detailed step-by-step logic implemented within the BAdI/User Exit to process the data received from the standard SAP program and database retrieval. It explains the operations performed on the data, the expected outcomes in different scenarios and how the system should behave in response to specific conditions.



Volumetrics

Provide volumetrics details: Initial load volumes, Number of Records, Expected Frequency, Expected Long term Growth)


Performance Considerations

Specify if there are any specific performance factors that need to be taken into consideration during development i.e. enhancement must be able to be executed by 10 users at the same time, etc.



Error Handling

Detail how errors will be handled: Notification, Restart/ Recovery and Re-Processing Procedures


Testing

How to Test

Please provide some guidance and/or test data to help the developer unit test the enhancement. Please include both positive and negative testing (to validate error situations handling). The developer will need to test repeatedly, so where appropriate provide instructions to reverse the actions performed so the test may be run again or explain how to create new input data to the test. The developer will need logons for test users representing the various roles within the approval process.

Test Conditions and Expected Results

IDConditionExpected Result










Test Considerations/Dependencies

List any considerations essential for application test planning (e.g., test this before ABC along with DEF separate from GHI). If the development encompasses a user interface, explain how to test it. List any insights as to how this component could be tested the most efficiently.


Other Information


Development Details

Package

Package NameParent Package




Enhancement Implementation

Enhancement TypeStandard Definition NameCustom Implementation NameDesign Rationale Reference









Other Development Objects

Object TypeObject NamePurpose/High Level LogicDesign Rationale Reference








Appendix

Custom Authorization Group Naming Convention

This table is based on the Syensqo development standards document. It provides the naming conventions for authorization groups to associated with custom reports and tables to comply with security requirements.

ABAP

ZFIZMMZPSZCOZSDZBCZFIZCA
TABLESZFITZMMTZPSTZCOTZSDTZBCTZFITZCAT

See also

Insert links and references to other documents which are relevant when trying to understand this decision and its implications. Other decisions are often impacted, so it's good to list them here with links. Attachments are also possible but dangerous as they are static documents and not updated by their authors.


Change log