Status

Owner
StakeholdersThe business stakeholders involved in making, reviewing, and endorsing this decision. Type @ to mention people by name

Purpose

The purpose of this document is to define the conversion approach for loading Business Partner – Contact Person Relationships in SAP S/4HANA. In ECC, contact persons are linked to customers using contact-specific tables. In S/4HANA, contact persons are modeled as Business Partners with a relationship type (e.g., BUR001) established between them and the related organization.

Conversion Scope

Customer Contact Person

The scope of this document covers the approach for converting active Contact Person from Legacy Source Systems into S/4HANA Business Partner (BP) Relationship Master Data Design Standard.

The data from legacy system includes:

  1. An individual is created with mandatory information : Name, Last Name, telephone, email address etc.
  2. An individual is assigned as a contact person OR assigned with partner functions under partner type "AP - Contact Person.
  3. There is no Deletion flag for the contact person (sales level) (KNVK-LOEVM)

The data from legacy system excludes:

  1. Contacts without mandatory contact details : Last Name, Telephone, Email
  2. Contacts not linked to any customers within scope.


List of source systems and approximate number of records
SourceScope

Source Approx No. of Records

Target SystemTarget Approx

No. of Records

WP2Customer Contact Person150,000S4 Hana ROW150,000
PF2Customer Contact Person150,000S4 Hana ROW150,000
WP2Customer Contact Person150,000S4 Hana China150,000
PF2Customer Contact Person150,000S4 Hana China150,000
WP2Customer Contact Person150,000S4 Hana CUI150,000
PF2Customer Contact Person150,000S4 Hana CUI150,000


Vendor Contact Person Relationship


The data from legacy system includes:

  1.  Vendors found in KNVK-LIFNR which pass Relevancy Rules under Data Object  (3007-Business Partners - General (Role 000000)) will be assigned with Contacts available from Legacy.

The data from legacy system excludes:

  1.  Contacts marked as deleted or obsolete (Inactive in HR) in the legacy system.
  2.  Contacts that are not uniquely identifiable, with missing mandatory information such as names or email or contact information.

List of source systems and approximate number of records


SourceScope

Source Approx No. of Records

Target SystemTarget Approx

No. of Records

WP2Vendor Contact Person50,000S4 Hana ROW50,000
PF2Vendor Contact Person50,000S4 Hana ROW50,000
WP2Vendor Contact Person50,000S4 Hana China50,000
PF2Vendor Contact Person50,000S4 Hana China50,000


Additional Information

Multi-language Requirement

N/A

Document Management

N/A

Legal Requirement

CMMC 2.0 is a mandatory DoD cybersecurity certification for contractors handling Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). CUI includes sensitive technical data (e.g., design specs, system info) related to U.S. military and space applications. The Composites Business handles CUI and is therefore within CMMC scope. Without certification, the business risks disqualification from existing and future DoD programs.
It is mandatory to implement CMMC-compliant systems and processes to for all the organizations that are dealing with CUI.

Therefore, there will be one SAP instance specifically for CUI related entities. The migration for CUI related entities will be covered by US based data consultant using separate tools.

Special Requirements

A. Different SAP Instance Migration Approach

Due to compliance requirement, there will be one SAP instance for Rest of the World (ROW), one for China and one for CUI. For Contact Person Relationship, the same data will be created in all 3 SAP instances.

Target Design

With Functional input, document the technical design of the target fields that are in the scope of this document.

The technical design of the target for this conversion approach.

TableFieldData ElementField DescriptionData TypeLengthRequirement
BUT050PARTNER1BU_PARTNERBusiness PartnerCHAR10Mandatory
BUT050PARTNER2BU_PARTNERBusiness PartnerCHAR10Mandatory
BUT050DATE_TOBU_DATTOValid FromDATS16Mandatory
BUT050DATE_FROMBU_DATFROMValid ToDATS16Mandatory
BUT050RELTYPBU_RELTYPRelationship CategoryCHAR12Mandatory
BUT050XDFRELBU_XDFRELStandard RelationshipCHAR2Optional
BUT050RELKINDBU_RELKINDBusiness partner relationship typeCHAR8Optional
BUT051PAVIPBU_PAVIPVIPCHAR1Optional
BUT051ABTNRBU_ABTNRDepartmentCHAR4Optional
BUT051PAFKTBU_PAFKTFunctionCHAR4Optional
BUT051PAAUTHBU_PAAUTHPartner's AuthorityCHAR1Optional
BUT051PAREMBU_PAREMNotes for PartnerCHAR40Optional
BUT051FNCTNBU_FNCTNAddress - FunctionCHAR40Optional
BUT051DPRTMNTBU_DPRTMNTAddress - DepartmentCHAR40Optional
ADCPDEFLT_COMMAD_COMMCommunication Method (Key) (Business Address Services)CHAR3Optional
ADCPROOMNUMBERAD_ROOMNUMAddress - Room NumberCHAR20Optional
ADCPFLOORAD_FLOORAddress - Floor NumberCHAR20Optional
ADCPBUILDINGAD_BLDNG_PAddress - BuildingCHAR20Optional
ADRCLANGUSPRASLANGUAGELANG2Optional
ADR2CONSNUMBERAD_CONSNUMSequence NumberNUMC3Mandatory
ADR2TEL_NUMBERAD_TLNMBRTELEPHONECHAR60Optional
ADR2TEL_EXTENSAD_TLXTNSEXTENSIONCHAR20Optional
ADR2FLGDEFAULTAD_FLGDFNRStandard Sender Address in this Communication TypeCHAR1Optional
ADR2FLG_NOUSEAD_FLNOUSEFlag: This Communication Number is Not UsedCHAR1Optional
ADR2HOME_FLAGAD_FLGHOMERecipient address in this communication type (mail sys.grp)CHAR1Optional
ADR3CONSNUMBERAD_CONSNUMSequence NumberNUMC3Mandatory
ADR3FAX_NUMBERAD_FXNMBR1FAXCHAR60Optional
ADR3FAX_EXTENSAD_FXXTNS1EXTENSIONCHAR20Optional
ADR3FLGDEFAULTAD_FLGDFNRStandard Sender Address in this Communication TypeCHAR1Optional
ADR3FLG_NOUSEAD_FLNOUSEFlag: This Communication Number is Not UsedCHAR1Optional
ADR3HOME_FLAGAD_FLGHOMERecipient address in this communication type (mail sys.grp)CHAR1Optional
ADR6CONSNUMBERAD_CONSNUMSequence NumberNUMC3Mandatory
ADR6SMTP_ADDRAD_SMTPADRE-MAILCHAR482Optional
ADR6FLGDEFAULTAD_FLGDFADFlag: this address is the default addressCHAR1Optional
ADR6FLG_NOUSEAD_FLNOUSEFlag: This Communication Number is Not UsedCHAR1Optional
ADR6HOME_FLAGAD_FLGHOMERecipient address in this communication type (mail sys.grp)CHAR1Optional
ADRCREMARKAD_REMARK1COMMENTSCHAR100Optional
ADRUCOMM_TYPEAD_COMMCommuntication MethodCHAR6Optional
BUT051CALL_RULEIDBU_RULEID_CRule ID / CallCHAR25Optional
BUT051VISIT_RULEIDBU_RULEID_VRule ID / VisitCHAR25Optional
KNVKMOAB1BEMOAB1Contact person's visiting hours: Monday morning from ...TIMS8Optional
KNVKMOAB2BEMOAB2Contact person's visiting hours: Monday afternoon from ...TIMS8Optional
KNVKMOBI1BEMOBI1Contact person's visiting hours: Monday morning until ...TIMS8Optional
KNVKMOBI2BEMOBI2Contact person's visiting hours: Monday afternoon until ...TIMS8Optional
KNVKDIAB1BEDIAB1Contact person's visiting hours: Tuesday morning from...TIMS8Optional
KNVKDIAB2BEDIAB2Contact person's visiting hours: Tuesday afternoon from..TIMS8Optional
KNVKDIBI1BEDIBI1Contact person's visiting hours: Tuesday morning until ...TIMS8Optional
KNVKDIBI2BEDIBI2Contact person's visiting hours: Tuesday afternoon until ...TIMS8Optional
KNVKMIAB1BEMIAB1Contact person's visiting hours: Wednesday morning from...TIMS8Optional
KNVKMIAB2BEMIAB2Contact person's visiting hours: Wednesday afternoon from ..TIMS8Optional
KNVKMIBI1BEMIBI1Contact person's visiting hours: Wednesday morning until ...TIMS8Optional
KNVKMIBI2BEMIBI2Contact person's visiting hours: Wednesday afternoon until..TIMS8Optional
KNVKDOAB1BEDOAB1Contact person's visiting hours: Thursday morning from ....TIMS8Optional
KNVKDOAB2BEDOAB2Contact person's visiting hours: Thursday afternoon from...TIMS8Optional
KNVKDOBI1BEDOBI1Contact person's visiting hours: Thursday morning until ....TIMS8Optional
KNVKDOBI2BEDOBI2Contact person's visiting hours: Thursday afternoon until ..TIMS8Optional
KNVKFRAB1BEFRAB1Contact person's visiting hours: Friday morning from ...TIMS8Optional
KNVKFRAB2BEFRAB2Contact person's visiting hours: Friday afternoon from ...TIMS8Optional
KNVKFRBI1BEFRBI1Contact person's visiting hours: Friday morning until ...TIMS8Optional
KNVKFRBI2BEFRBI2Contact person's visiting hours: Friday afternoon until ...TIMS8Optional
KNVKSAAB1BESAAB1Contact person's visiting hours: Saturday morning from ...TIMS8Optional
KNVKSAAB2BESAAB2Contact person's visiting hours: Saturday afternoon from ...TIMS8Optional
KNVKSABI1BESABI1Contact person's visiting hours: Saturday morning until ...TIMS8Optional
KNVKSABI2BESABI2Contact person's visiting hours: Saturday afternoon until ..TIMS8Optional
KNVKSOAB1BESOAB1Contact person's visiting hours: Sunday morning from ...TIMS8Optional
KNVKSOAB2BESOAB2Contact person's visiting hours: Sunday afternoon from ...TIMS8Optional
KNVKSOBI1BESOBI1Contact person's visiting hours: Sunday morning until ...TIMS8Optional
KNVKSOBI2BESOBI2Contact person's visiting hours: Sunday afternoon until ...TIMS8Optional


Data Cleansing

IDCriticalityError Message/Report DescriptionRuleOutputSource System
3010-001
Contact person is not in scope

For contact person which customer is not in 3011 migration scope. 


PF2/WP2




















Conversion Process

The high-level process is represented by the diagram below:

1. Extraction
The process begins with extracting metadata and raw data from source systems, such as Syensqo ECC system (i.e., WP2/PF2) periodically. The extracted data is then staged for transformation.


2. Transformation
Once extracted, the data undergoes cleansing, consolidation, and governance. This step ensures data integrity, consistency, and compliance with business rules. The transformation process includes:
- Data validation to remove inconsistencies.
- Standardization to align formats across datasets.
- Business rule application to refine data for operational use.


3. Loading
The transformed data is then loaded into the target S4 Hana system. 


Data Privacy and Sensitivity

The object contains the exact contact information of a specific individual. This data must be handled with great care.


Extraction

Extract data from a source into Syniti Migrate. There are 2 possibilities:

  1. The data exists. Syniti Migrate connects to the source and loads the data into Syniti Migrate. There are 3 methods:
    1. Perform full data extraction from relevant tables in the source system(s).
    2. Perform extraction through the application layer.
    3. Only if Syniti Migrate cannot connect to the source, data is loaded to the repository from the provided source system extract/report.
  2. The data does not exist (or cannot be converted from its current state).  The data is manually collected by the business directly in Syniti Migrate. This is to be conducted using DCT (Data Collection Template) in Syniti Migrate

The agreed Relevancy criteria is applied to the extracted records to identify the records that are applicable for the Target loads

Extraction Run Sheet

Req #Requirement DescriptionTeam Responsible
1

Extraction Scope Definition

- Identify the source systems and databases involved.
- Define the data objects (tables, fields, records) to be extracted.
- Establish business rules for data selection.

Syniti / LTC Data team
2

Extraction Methodology

- Specify the extraction approach (full, incremental, or delta extraction).
- Determine the tools and technologies used.
- Define data filtering criteria to exclude irrelevant records.

Syniti
3

Extraction Execution Plan

- Establish execution timelines and batch processing schedules.
- Assign responsibilities for extraction monitoring.
- Document dependencies on other migration tasks.

Syniti
4

Data Quality and Validation

- Define error handling mechanisms for extraction failures.

Syniti


Selection Screen

If applicable, this section will give the details on any selection screen parameters, including the parameter type, that are required to be entered to ensure consistent data extracts.
Selection Ref ScreenParameter NameSelection TypeRequirementValue to be entered/set
SE16N

Contact person for in-scope customers

To select all contact person assigned to in-scope customers


Select all contact person from table KNVK Where KNVK-KUNNR is in object 3011 migration list.

















Data Collection Template (DCT)

Target Ready Data Collection Template will be created for Data Object data with exception of some fields which require transformation as mentioned in the transformation rule.


Field NameField DescriptionRule












Extraction Dependencies

Item #Step DescriptionTeam Responsible
1

Source System Availability

  • Ensure that the source database or application is accessible.
  • Confirm that necessary credentials and permissions are granted
Syensqo IT
2

Data Structure

  • Identify relationships between tables, views, and stored procedures.
Syniti
3

Referential Integrity

  • Ensure dependent records are extracted together.
Syniti
4

Extraction Methodology

  • Define whether extraction is full, incremental, or delta-based.
  • Establish batch processing schedules for large datasets.
Syniti
5

Performance and Scalability Considerations

  • Optimize extraction queries to prevent system overload.
  • Ensure network bandwidth supports data transfer volumes.
Syniti
6

Security and Compliance

  • Adhere to regulatory standards for sensitive information if applicable
Syniti


Transformation

The Target fields are mapped to the applicable Legacy field that will be its source, this is a 3-way activity involving the Business, Functional team and Data team. This identifies the transformation activity required to allow Syniti Migrate
to make the data Target ready:

  1. Perform value mapping and data transformation rules.
    1. Legacy values are mapped to the to-be values (this could include a default value)
    2. Values are transformed according to the rules defined in Syniti Migrate
  2. Prepare target-ready data in the structure and format that is required for loading via prescribed Load Tool. This step also produces the load data ready for business to perform Pre-load Data Validation

Transformation Run Sheet

Item #Step DescriptionTeam Responsible
1Transformation Scope Definition
- Identify the source and target data structures.
- Define business rules for data standardization.
- Establish data cleansing requirements to remove inconsistencies.
Data Team, Functional Team
2Data Mapping and Standardization
- Align source fields with target fields.
- Ensure unit consistency (e.g., currency, measurement units)
Data Team, Functional Team
3Business Rule Application
- Implement data enrichment/collection if applicable
- Apply conditional transformations based on predefined logic/business rules
Data Team, Functional Team
4Transformation Execution Plan
- Define batch processing schedules.
- Assign responsibilities for monitoring execution.
- Establish error-handling mechanisms
Synithi
5Configure transformation rules in Syniti Migrate (including calculated fields, formatting rules, etc.)Data Team (Syniti), Data Team (L2C)
6Review transformation logic and mappings with Business for confirmationBusiness Team + Functional Team (L2C)
7Perform initial transformation run and generate draft target-ready datasetData Team (Syniti),
8Review draft target-ready data for structure and completenessData Team (L2C), Functional Team (L2C)
9Share transformed data with Business for Pre-load ValidationBusiness Team
10Incorporate feedback from Business and refine mappings or transformation logic as neededData Team (L2C)
11Finalize and approve transformed data as Target Ready Load FileBusiness + Functional (L2C) + Data Team (L2C)
12Handover final file to Load Team or trigger the load via Syniti Load WorkbenchData Team (Syniti), Data Load Team


Transformation Rules

Rule #Source systemSource TableSource FieldSource DescriptionTarget SystemTarget TableTarget FieldTarget DescriptionTransformation Logic
1PF2 WP2KNVKPARNRBusiness PartnerCUI ROW ChinaBUT050PARTNER1Business PartnerCopy 1:1
2PF2 WP2KNVKKUNNRBusiness PartnerCUI ROW ChinaBUT050PARTNER2Business PartnerCustomer_XREF
3PF2 WP2ADCPDATE_FROMValid FromCUI ROW ChinaBUT050DATE_TOValid FromCopy 1:1
4PF2 WP2ADCPDATE_TOValid ToCUI ROW ChinaBUT050DATE_FROMValid ToCopy 1:1
5PF2 WP2N/AN/ARelationship CategoryCUI ROW ChinaBUT050RELTYPRelationship Category

Default : BUR001

6PF2 WP2N/AN/AStandard RelationshipCUI ROW ChinaBUT050XDFRELStandard RelationshipDefault : Blank 
7PF2 WP2N/AN/ABusiness partner relationship typeCUI ROW ChinaBUT050RELKINDBusiness partner relationship typeDefault : Blank
8PF2 WP2KNVKPAVIPVIPCUI ROW ChinaBUT051PAVIPVIPCopy 1:1
9PF2 WP2KNVKABTNRDepartmentCUI ROW ChinaBUT051ABTNRDepartmentMapping
10PF2 WP2KNVKPAFKTFunctionCUI ROW ChinaBUT051PAFKTFunctionMapping
11PF2 WP2KNVKPARVOPartner's AuthorityCUI ROW ChinaBUT051PAAUTHPartner's AuthorityCopy 1:1
12PF2 WP2KNVKPARAUNotes for PartnerCUI ROW ChinaBUT051PAREMNotes for PartnerCopy 1:1
13PF2 WP2DEFLT_COMMAD_COMMCommunication Method (Key) (Business Address Services)CUI ROW ChinaDEFLT_COMMAD_COMMCommunication Method (Key) (Business Address Services)Copy 1:1
14PF2 WP2ADCPFUNCTIONAddress - FunctionCUI ROW ChinaBUT051FNCTNAddress - FunctionCopy 1:1
15PF2 WP2ADCPDEPARTMENTAddress - DepartmentCUI ROW ChinaBUT051DPRTMNTAddress - DepartmentCopy 1:1
16PF2 WP2ADCPROOMNUMBERAddress - Room NumberCUI ROW ChinaADCPROOMNUMBERAddress - Room NumberCopy 1:1
17PF2 WP2ADCPFLOORAddress - Floor NumberCUI ROW ChinaADCPFLOORAddress - Floor NumberCopy 1:1
18PF2 WP2ADCPBUILDINGAddress - BuildingCUI ROW ChinaADCPBUILDINGAddress - BuildingCopy 1:1
19PF2 WP2ADRCLANGULANGUAGECUI ROW ChinaADRCLANGULANGUAGECopy 1:1
20PF2 WP2ADR2CONSNUMBERSequence NumberCUI ROW ChinaADR2CONSNUMBERSequence NumberCopy 1:1
21PF2 WP2ADR2TEL_NUMBERTELEPHONECUI ROW ChinaADR2TEL_NUMBERTELEPHONECopy 1:1
22PF2 WP2ADR2TEL_EXTENSEXTENSIONCUI ROW ChinaADR2TEL_EXTENSEXTENSIONCopy 1:1
23PF2 WP2ADR2FLGDEFAULTStandard Sender Address in this Communication TypeCUI ROW ChinaADR2FLGDEFAULTStandard Sender Address in this Communication TypeCopy 1:1
24PF2 WP2ADR2FLG_NOUSEFlag: This Communication Number is Not UsedCUI ROW ChinaADR2FLG_NOUSEFlag: This Communication Number is Not UsedCopy 1:1
25PF2 WP2ADR2HOME_FLAGRecipient address in this communication type (mail sys.grp)CUI ROW ChinaADR2HOME_FLAGRecipient address in this communication type (mail sys.grp)Copy 1:1
26PF2 WP2ADR3CONSNUMBERSequence NumberCUI ROW ChinaADR3CONSNUMBERSequence NumberCopy 1:1
27PF2 WP2ADR3FAX_NUMBERFAXCUI ROW ChinaADR3FAX_NUMBERFAXCopy 1:1
28PF2 WP2ADR3FAX_EXTENSEXTENSIONCUI ROW ChinaADR3FAX_EXTENSEXTENSIONCopy 1:1
29PF2 WP2ADR3FLGDEFAULTStandard Sender Address in this Communication TypeCUI ROW ChinaADR3FLGDEFAULTStandard Sender Address in this Communication TypeCopy 1:1
30PF2 WP2ADR3FLG_NOUSEFlag: This Communication Number is Not UsedCUI ROW ChinaADR3FLG_NOUSEFlag: This Communication Number is Not UsedCopy 1:1
31PF2 WP2ADR3HOME_FLAGRecipient address in this communication type (mail sys.grp)CUI ROW ChinaADR3HOME_FLAGRecipient address in this communication type (mail sys.grp)Copy 1:1
32PF2 WP2ADR6CONSNUMBERSequence NumberCUI ROW ChinaADR6CONSNUMBERSequence NumberCopy 1:1
33PF2 WP2ADR6SMTP_ADDRE-MAILCUI ROW ChinaADR6SMTP_ADDRE-MAILCopy 1:1
34PF2 WP2ADR6FLGDEFAULTFlag: this address is the default addressCUI ROW ChinaADR6FLGDEFAULTFlag: this address is the default addressCopy 1:1
35PF2 WP2ADR6FLG_NOUSEFlag: This Communication Number is Not UsedCUI ROW ChinaADR6FLG_NOUSEFlag: This Communication Number is Not UsedCopy 1:1
36PF2 WP2ADR6HOME_FLAGRecipient address in this communication type (mail sys.grp)CUI ROW ChinaADR6HOME_FLAGRecipient address in this communication type (mail sys.grp)Copy 1:1
37PF2 WP2ADRCTREMARKCOMMENTSCUI ROW ChinaADRCTREMARKCOMMENTSCopy 1:1
38PF2 WP2ADRUCOMM_TYPECommuntication MethodCUI ROW ChinaADRUCOMM_TYPECommuntication MethodCopy 1:1
39PF2 WP2N/AN/A
CUI ROW ChinaBUT051CALL_RULEIDRule ID / Call

Not used for L2C

40PF2 WP2KNVKMOAB1

Contact person's visiting hours: Monday morning from ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
41PF2 WP2KNVKMOAB2

Contact person's visiting hours: Monday afternoon from ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
42PF2 WP2KNVKMOBI1

Contact person's visiting hours: Monday morning until ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
43PF2 WP2KNVKMOBI2

Contact person's visiting hours: Monday afternoon until ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
44PF2 WP2KNVKDIAB1

Contact person's visiting hours: Tuesday morning from...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
45PF2 WP2KNVKDIAB2

Contact person's visiting hours: Tuesday afternoon from..

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
46PF2 WP2KNVKDIBI1

Contact person's visiting hours: Tuesday morning until ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
47PF2 WP2KNVKDIBI2

Contact person's visiting hours: Tuesday afternoon until ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
48PF2 WP2KNVKMIAB1

Contact person's visiting hours: Wednesday morning from...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
49PF2 WP2KNVKMIAB2

Contact person's visiting hours: Wednesday afternoon from ..

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
50PF2 WP2KNVKMIBI1

Contact person's visiting hours: Wednesday morning until ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
51PF2 WP2KNVKMIBI2

Contact person's visiting hours: Wednesday afternoon until..

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
52PF2 WP2KNVKDOAB1

Contact person's visiting hours: Thursday morning from ....

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
53PF2 WP2KNVKDOAB2

Contact person's visiting hours: Thursday afternoon from...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
54PF2 WP2KNVKDOBI1

Contact person's visiting hours: Thursday morning until ....

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
55PF2 WP2KNVKDOBI2

Contact person's visiting hours: Thursday afternoon until ..

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
56PF2 WP2KNVKFRAB1

Contact person's visiting hours: Friday morning from ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
57PF2 WP2KNVKFRAB2

Contact person's visiting hours: Friday afternoon from ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
58PF2 WP2KNVKFRBI1

Contact person's visiting hours: Friday morning until ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
59PF2 WP2KNVKFRBI2

Contact person's visiting hours: Friday afternoon until ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
60PF2 WP2KNVKSAAB1

Contact person's visiting hours: Saturday morning from ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
61PF2 WP2KNVKSAAB2

Contact person's visiting hours: Saturday afternoon from ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
62PF2 WP2KNVKSABI1

Contact person's visiting hours: Saturday morning until ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
63PF2 WP2KNVKSABI2

Contact person's visiting hours: Saturday afternoon until ..

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
64PF2 WP2KNVKSOAB1

Contact person's visiting hours: Sunday morning from ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
65PF2 WP2KNVKSOAB2

Contact person's visiting hours: Sunday afternoon from ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
66PF2 WP2KNVKSOBI1

Contact person's visiting hours: Sunday morning until ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1
67PF2 WP2KNVKSOBI2

Contact person's visiting hours: Sunday afternoon until ...

CUI ROW ChinaBUT051VISIT_RULEIDRule ID / VisitCopy 1:1



Transformation Rules (S2P Vendor)

Rule #Source systemSource TableSource FieldSource DescriptionTarget SystemTarget TableTarget FieldTarget DescriptionTransformation Logic










Transformation Mapping

Use the exact name and reference this section in the “Transformation rules” above
Mapping Table NameMapping Table Description








Transformation Dependencies

List the steps that need to occur before transformation can commence
Item #Step DescriptionTeam Responsible
1Source Data Integrity
- Ensure extracted data is complete, accurate, and consistent.
- Validate that data types and formats align with transformation requirements.
Synithi
2Referential Integrity
- Ensure dependent records are transformed together or in advance
Synithi
3Transformation Logic and Mapping
- Define data mapping rules between source and target schemas.
Data Team
4Performance and Scalability Considerations
- Optimize transformation processes for large datasets.
- Ensure system resources can handle transformation workloads
Synithi
5Logging and Error Handling
- Maintain detailed logs of transformation activities.
- Define error-handling procedures for failed transformations
Synithi


Pre-Load Validation

Project Team

The following pre-load validations will be performed by the Project Team.

Completeness

TaskAction

Validate the record count

Verify that the data extracted from the legacy system is complete and accurate by comparing record counts and contact person against the source system

Validate the mandatory fields

Validate there is value for all the mandatory fields



Accuracy

TaskAction

Validate the transformation

Verify that all transformation rules have been correctly applied and that transformed fields display the expected target values

Validate the extraction

Verify that all copied fields accurately reflect the source system values to ensure the extraction process has correctly transferred the data.




Business

The following pre-load validations will be performed by the Business.

Completeness

TaskAction

Validate the record count

Verify that the data extracted from the legacy system is complete and accurate by comparing record counts and contact person against the source system

Validate the mandatory fields

Validate there is value for all the mandatory fields




Accuracy

TaskAction

Validate the transformation

Validate the fields which require transformation have the value after transformation instead of the original field value

Validate the extraction

Verify that all copied fields accurately reflect the source system values to ensure the extraction process has correctly transferred the data.




Load

The load process includes:

  1. Execute the automated data load into target system using load tool or product the load file if the load must be done manually
  2. Once the data is loaded to the target system, it will be extracted and prepared for Post Load Data Validation

Load Run Sheet

Item #Step DescriptionTeam Responsible
1Load Scope Definition
- Identify the target system and database structure.
- Define data objects (tables, fields, records) to be loaded.
- Establish business rules for data validation.
Data team
2Load Methodology
- Specify the loading tools and technologies (Migration Cockpit, LSMW, custom loading program).
Syniti
3Data Quality and Validation
- Ensure data integrity checks (null values, duplicates, format validation).
- Perform pre-load validations to verify completeness.
- Define error handling mechanisms for load failures
Syniti
4Load Execution Plan
- Establish execution timelines and batch processing schedules.
- Assign responsibilities for monitoring execution.
- Document dependencies on other migration tasks
Syniti
5Logging and Reporting
- Maintain detailed logs of loading activities.
- Generate summary reports on loaded data volume and quality.
- Define escalation procedures for errors
Syniti


Load Phase and Dependencies

Identify the phase as to “when” the load for this object will occur. <Pre-Cutover, Cutover, Post Cutover> and list the steps that need to occur before the load can commence

Configuration

List the Configurations required before loading can commence

Item #Configuration Item
1BUT050-RELTYP Relationship Category is configured and valid in the target system




Conversion Objects

Object #Preceding Object Conversion Approach
3011list the exact title of the conversion object of only the immediate predecessor – this will then confirm the DDD (Data Dependency Diagram)




Error Handling

The table below depicts some possible system errors for this data object during data load. All data load error is to be logged as defect and managed within the Defect Management

Error TypeError DescriptionAction Taken
1

The value XXX for field XXX doesn't exist

  1. Check the mapping/conversion is done properly in the loading file
  2. Validate the target value is configured/transported in the target system
  3. Reach out to function team to validate the configuration
2

There is mandatory field XXX missing

  1. Validate MDS if the fields are set as mandatory
  2. Validate if there is value in the pre-loading file
  3. Validate if the configuration for the mandatory fields are done properly




Post-Load Validation

Project Team

The following post-load validations will be performed by the Project Team.

Completeness

TaskAction

Validate Record count in the backend

Validate the main tables BUT100 is loaded.

Display Records

Pick up few random BP numbers, and Run the BP Report to validate the BUP001 information can be displayed without any error




Accuracy

TaskAction
Check values in key fields for accuracy

Post-load reports will have the same structure as the load file and some additional columns as required to facilitate the post load validation.

Leverage on tool to create a Post Load report that reports S/4HANA loaded records along with the legacy values side-by-side to allow for 100% check of all these fields in the shortest possible time.

Any mismatch will be reported under the Post Load - Error report.






Business

The following post-load validations will be performed by the Business.

Completeness

TaskAction
Record Count Check

Review the record count report from the Data Team and ensure it is correct by cross-checking with the record count confirmed during Pre-load Business Validations






Accuracy

TaskAction
Spot checkBusiness should choose some business partners, display the contact person with transaction code "BP" and perform comprehensive check on all loaded details and relationship





Key Assumptions

  • Master Data Standard is up to date as on the date of documenting this conversion approach and data load.
  • 3010 is in scope based on data design and any exception requested by business.

Any additional key assumptions.


See also

Insert links and references to other documents which are relevant when trying to understand this decision and its implications. Other decisions are often impacted, so it's good to list them here with links. Attachments are also possible but dangerous as they are static documents and not updated by their authors.

Change log

Workflow history