| Status | |
|---|---|
| Owner | SHARMA-ext, Meenakshi |
| Stakeholders | Laurence DANNET, Paulo Golinelli |
| Jira Request ID | |
| Jira Development ID |
| Parameter | Value |
|---|---|
| Application System | S/4Hana ROW, S/4Hana China, S/4Hana CUI |
| Business Process Reference | 03.04.06.01. Manage Invoice Receipt 03.04.06.03. Post Invoice |
A custom function module will be developed to validate incoming vendor invoices that are not associated with a Purchase Order (Non-PO invoices). The module will enforce the company’s “No PO, No Pay” policy by verifying whether the vendor is authorized to submit Non-PO invoices, allowing only limited exceptions. Non-PO invoices flagged as Not Allowed for Non-PO will be automatically rejected, except for credit memos or invoices originating from the OCR channel.
The objective of this enhancement is to implement a functional control mechanism that automatically identifies and rejects Non-PO invoices submitted by vendors who are not authorized for Non-PO invoice processing as per the Vendor Master Data settings. This will ensure adherence to company policy, improve invoice validation accuracy, and reduce manual intervention.
This functional module will have:
Validation Logic
Check all incoming invoices to determine whether they are Non-PO invoices.
Cross-reference each Non-PO invoice with the Vendor Master Data to verify if the vendor is flagged as allowed for Non-PO invoices.
Exception Handling
If the vendor is not allowed for Non-PO invoices:
The system will auto-reject the invoice.
The rejection will apply only if:
The source input channel is not OCR (Optical Character Recognition), and EDICOM
The invoice is not a credit memo.
System Behavior
For invoices meeting the exception criteria (vendor not allowed, not from OCR, and not a credit memo), the system will automatically:
Flag the invoice as “Rejected – Non-PO not allowed for vendor”.
Send rejection status to source Portal
Audit and Reporting
Maintain a log or report of all invoices auto-rejected under this rule, rejection reason, and timestamp, for audit and compliance purposes.

Step | Description | Comment |
|---|---|---|
| 1 | Receive Invoice Without PO Reference | Invoices without PO can be received through various input channels, including Email, Supplier Portal, SAP Business Network, IDoc, and EDICOM. |
| 2 | Check If Invoice Vendor Is Allowed For Non-PO | Validate whether the invoice vendor is authorized for Non-PO processing based on the Vendor Master Data and flag as 'Not Allowed For Non-PO' if vendor is not authorized for Non-PO. |
| 3 | Check Transaction Type and Source Channel | Validate that the flagged invoice’s source channel is neither OCR nor EDICOM, and that the transaction type is not a credit memo. |
| 4 | Trigger Auto Rejection | Trigger Auto Rejection using RTV if invoice’s source channel is neither OCR nor EDICOM, and that the transaction type is not a credit memo. |
| 5 | Manual Exception Handling | Invoice flagged as 'Not Allowed For Non-PO' will undergo manual review by Account Payable accountants if invoice’s source channel is either OCR or EDICOM, and that the transaction type is a credit memo. |
Describe any assumptions that have been made in the process of completing this design. What functionality is expected of configuration or other developments that pass information to this development and/ or retrieve the information processed by it (performance, triggers, exceptions, etc.)
Indicate any dependencies or constraints that may impact this development, in terms of requirements from internal or external applications, other work streams, time constraints, data or system access restrictions. Also, please specify scheduling or process dependencies, e.g. interface/batch job that must run beforehand or process steps that need to be completed prior to executing this development.
To detail the security requirements for processing this enhancement, any data integrity issues associated with the object and the teams that will be responsible for processing the object, i.e. authorization/roles required to who can execute the enhancements, etc.
- Custom Tables, enhancement, transaction codes, programs, Web Dynpro Application, Code Data Services (CDS), Open Data Protocol (OData), BI reports, and Functional Modules need to have at least one authority check either standard or custom. (custom should be an exception)
- All custom tables will be maintained in a certain Authorization Group (example: ZFIN, etc.)
- In the case of transaction codes an additional check other than the object S_TCODE is required. You can use SU24 to find the related authorization objects to check.
All other WRICEFs
- If the authorization check is already performed in the calling Programs, this section can be filled as “Follow calling programs authorization check” (example : BADI to redirect DMS to OpenText, in which the calling Manage Purchase requisition Fiori App already performed authorization check)
- If the authorization check is not checked in any of the development, this section should be filled with the proposed authorization check. You can refer to SU24 to see the standard authorization objects. (example: full custom Fiori App to enable user to download/upload the project plan)
Specify the configuration requirements for this object. Like in case of substitution/ routine specify the configuration needed
Specify the language requirements for this object. Specify the required language and type of translation, like labels, data.
Specify any special requirements or considerations that may impact the enhancement based on specific locations, regulatory compliance or system limitations. Clearly outline requirements e.g. localization rules for countries like China
If the enhancement interacts with third-party systems such as Icertis, describe any additional integration, security or authentication considerations that must be taken into account.
Detail the functional requirements that are desired to be achieved by the Enhancement compared to current functionality
Typically, an enhancement will be based on an existing SAP BADI / user exit. If this is the case, please provide the proposed details of the BADI / user exit.
Include an overview of the source
| Table | Field Name | Comments/Calculation/Field Manipulation |
|---|---|---|
Include an overview of the data validation requirement
| Table | Field Name | Comments/Calculation/Field Manipulation |
|---|---|---|
If any custom configuration tables are required, which will be read by the enhancement logic, then specify them here.
<Title Custom Table 1>
<Include an overview of the table and what it’s used for>
| Field | Description | Data Type/Length | Validation rule/ Value Help |
|---|---|---|---|
Title Configuration Table 1
Include an overview of the table and what it’s used for
| Field | Description | Data Type/Length | Validation rule/ Value Help |
|---|---|---|---|
This section will give the details on the selection screen parameters, parameter type and whether it’s obligatory or not. This section can be used to define the Import Export parameters for Function Module or User Exit or Screens.
| Field Name | Description | Select: Option or Parameter Check box or Radio button Import or Export | Data Type/Length | Default Value/ Validation rule/ Value Help | Selection Logic |
|---|---|---|---|---|---|
This section defines the detailed step-by-step logic implemented within the BAdI/User Exit to process the data received from the standard SAP program and database retrieval. It explains the operations performed on the data, the expected outcomes in different scenarios and how the system should behave in response to specific conditions.
Provide volumetrics details: Initial load volumes, Number of Records, Expected Frequency, Expected Long term Growth)
Specify if there are any specific performance factors that need to be taken into consideration during development i.e. enhancement must be able to be executed by 10 users at the same time, etc.
Detail how errors will be handled: Notification, Restart/ Recovery and Re-Processing Procedures
Please provide some guidance and/or test data to help the developer unit test the enhancement. Please include both positive and negative testing (to validate error situations handling). The developer will need to test repeatedly, so where appropriate provide instructions to reverse the actions performed so the test may be run again or explain how to create new input data to the test. The developer will need logons for test users representing the various roles within the approval process.
| ID | Condition | Expected Result |
|---|---|---|
List any considerations essential for application test planning (e.g., test this before ABC along with DEF separate from GHI). If the development encompasses a user interface, explain how to test it. List any insights as to how this component could be tested the most efficiently.
| Package Name | Parent Package |
|---|---|
| Enhancement Type | Standard Definition Name | Custom Implementation Name | Design Rationale Reference |
|---|---|---|---|
| Object Type | Object Name | Purpose/High Level Logic | Design Rationale Reference |
|---|---|---|---|
This table is based on the Syensqo development standards document. It provides the naming conventions for authorization groups to associated with custom reports and tables to comply with security requirements.
ABAP | ZFI | ZMM | ZPS | ZCO | ZSD | ZBC | ZFI | ZCA |
|---|---|---|---|---|---|---|---|---|
| TABLES | ZFIT | ZMMT | ZPST | ZCOT | ZSDT | ZBCT | ZFIT | ZCAT |
Insert links and references to other documents which are relevant when trying to understand this decision and its implications. Other decisions are often impacted, so it's good to list them here with links. Attachments are also possible but dangerous as they are static documents and not updated by their authors.
