You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »

Purpose

The purpose of this document is to define the conversion approach for loading Business Partner – Contact Person Relationships in SAP S/4HANA. In ECC, contact persons are linked to customers using contact-specific tables. In S/4HANA, contact persons are modeled as Business Partners with a relationship type (e.g., BUR001) established between them and the related organization.

Conversion Scope

Customer Contact Person

The scope of this document covers the approach for converting active Contact Person from Legacy Source Systems into S/4HANA Business Partner (BP) Relationship Master Data Design Standard.

The data from legacy system includes:

  1. An individual is created with mandatory information : Name, Last Name, telephone, email address etc.
  2. An individual is assigned as a contact person OR assigned with partner functions under partner type "AP - Contact Person.
  3. There is no Deletion flag for the contact person (sales level) (KNVK-LOEVM)

The data from legacy system excludes:

  1. Contacts without mandatory contact details : Last Name, Telephone, Email
  2. Contacts not linked to any customers within scope.


List of source systems and approximate number of records
SourceScope

Source Approx No. of Records

Target SystemTarget Approx

No. of Records

WP2Customer Contact Person
S4 Hana ROW
PF2Customer Contact Person
S4 Hana ROW
WP2Customer Contact Person
S4 Hana China
PF2Customer Contact Person
S4 Hana China
WP2Customer Contact Person
S4 Hana CUI
PF2Customer Contact Person
S4 Hana CUI


Vendor Contact Person Relationship


The data from legacy system includes:


The data from legacy system excludes:

  1.  

List of source systems and approximate number of records


SourceScope

Source Approx No. of Records

Target SystemTarget Approx

No. of Records

WP2Vendor Contact Person
S4 Hana ROW
PF2Vendor Contact Person
S4 Hana ROW
WP2Vendor Contact Person
S4 Hana China
PF2Vendor Contact Person
S4 Hana China


Additional Information

Multi-language Requirement

N/A

Document Management

N/A

Legal Requirement

CMMC 2.0 is a mandatory DoD cybersecurity certification for contractors handling Controlled Unclassified Information (CUI) and Federal Contract Information (FCI). CUI includes sensitive technical data (e.g., design specs, system info) related to U.S. military and space applications. The Composites Business handles CUI and is therefore within CMMC scope. Without certification, the business risks disqualification from existing and future DoD programs.
It is mandatory to implement CMMC-compliant systems and processes to for all the organizations that are dealing with CUI.

Therefore, there will be one SAP instance specifically for CUI related entities. The migration for CUI related entities will be covered by US based data consultant using separate tools.

Special Requirements

A. Different SAP Instance Migration Approach

Due to compliance requirement, there will be one SAP instance for Rest of the World (ROW), one for China and one for CUI. For BP general data, the same data will be created in all 3 SAP instances.

Target Design

The technical design of the target for this conversion approach.

TableFieldData ElementField DescriptionData TypeLengthRequirement






















Data Cleansing

Same data cleansing requirements with object 3011. 

IDCriticalityError Message/Report DescriptionRuleOutputSource System


























Conversion Process

The high-level process is represented by the diagram below:

1. Extraction
The process begins with extracting metadata and raw data from source systems, such as Syensqo ECC system (i.e., WP2/PF2) periodically. The extracted data is then staged for transformation.


2. Transformation
Once extracted, the data undergoes cleansing, consolidation, and governance. This step ensures data integrity, consistency, and compliance with business rules. The transformation process includes:
- Data validation to remove inconsistencies.
- Standardization to align formats across datasets.
- Business rule application to refine data for operational use.


3. Loading
The transformed data is then loaded into the target S4 Hana system. 


Data Privacy and Sensitivity

The object contains the exact contact information of a specific individual. This data must be handled with great care.


Extraction

Extract data from a source into Syniti Migrate. There are 2 possibilities:

  1. The data exists. Syniti Migrate connects to the source and loads the data into Syniti Migrate. There are 3 methods:
    1. Perform full data extraction from relevant tables in the source system(s).
    2. Perform extraction through the application layer.
    3. Only if Syniti Migrate cannot connect to the source, data is loaded to the repository from the provided source system extract/report.
  2. The data does not exist (or cannot be converted from its current state).  The data is manually collected by the business directly in Syniti Migrate. This is to be conducted using DCT (Data Collection Template) in Syniti Migrate

The agreed Relevancy criteria is applied to the extracted records to identify the records that are applicable for the Target loads

Extraction Run Sheet

Req #Requirement DescriptionTeam Responsible
1

Extraction Scope Definition

- Identify the source systems and databases involved.
- Define the data objects (tables, fields, records) to be extracted.
- Establish business rules for data selection.

Syniti / LTC Data team
2

Extraction Methodology

- Specify the extraction approach (full, incremental, or delta extraction).
- Determine the tools and technologies used.
- Define data filtering criteria to exclude irrelevant records.

Syniti
3

Extraction Execution Plan

- Establish execution timelines and batch processing schedules.
- Assign responsibilities for extraction monitoring.
- Document dependencies on other migration tasks.

Syniti
4

Data Quality and Validation

- Define error handling mechanisms for extraction failures.

Syniti


Selection Screen

Selection Ref ScreenParameter NameSelection TypeRequirementValue to be entered/set
SE16N

Contact person for in-scope customers

To select all contact person assigned to in-scope customers


Select all contact person from table KNVK Where KNVK-KUNNR is in object 3007 customer migration list.

















Data Collection Template (DCT)

Target Ready Data Collection Template will be created for data with exception of some fields which require transformation as mentioned in the transformation rule.


Field NameField DescriptionRule












Extraction Dependencies

Item #Step DescriptionTeam Responsible
1

Source System Availability

  • Ensure that the source database or application is accessible.
  • Confirm that necessary credentials and permissions are granted
Syensqo IT
2

Data Structure

  • Identify relationships between tables, views, and stored procedures.
Syniti
3

Referential Integrity

  • Ensure dependent records are extracted together.
Syniti
4

Extraction Methodology

  • Define whether extraction is full, incremental, or delta-based.
  • Establish batch processing schedules for large datasets.
Syniti
5

Performance and Scalability Considerations

  • Optimize extraction queries to prevent system overload.
  • Ensure network bandwidth supports data transfer volumes.
Syniti
6

Security and Compliance

  • Adhere to regulatory standards for sensitive information if applicable
Syniti


Transformation

The Target fields are mapped to the applicable Legacy field that will be its source, this is a 3-way activity involving the Business, Functional team and Data team. This identifies the transformation activity required to allow Syniti Migrate
to make the data Target ready:

  1. Perform value mapping and data transformation rules.
    1. Legacy values are mapped to the to-be values (this could include a default value)
    2. Values are transformed according to the rules defined in Syniti Migrate
  2. Prepare target-ready data in the structure and format that is required for loading via prescribed Load Tool. This step also produces the load data ready for business to perform Pre-load Data Validation

Transformation Run Sheet

Item #Step DescriptionTeam Responsible
1Transformation Scope Definition
- Identify the source and target data structures.
- Define business rules for data standardization.
- Establish data cleansing requirements to remove inconsistencies.
Data Team, Functional Team
2Data Mapping and Standardization
- Align source fields with target fields.
- Ensure unit consistency (e.g., currency, measurement units)
Data Team, Functional Team
3Business Rule Application
- Implement data enrichment/collection if applicable
- Apply conditional transformations based on predefined logic/business rules
Data Team, Functional Team
4Transformation Execution Plan
- Define batch processing schedules.
- Assign responsibilities for monitoring execution.
- Establish error-handling mechanisms
Synithi
5Configure transformation rules in Syniti Migrate (including calculated fields, formatting rules, etc.)Data Team (Syniti), Data Team (L2C)
6Review transformation logic and mappings with Business for confirmationBusiness Team + Functional Team (L2C)
7Perform initial transformation run and generate draft target-ready datasetData Team (Syniti),
8Review draft target-ready data for structure and completenessData Team (L2C), Functional Team (L2C)
9Share transformed data with Business for Pre-load ValidationBusiness Team
10Incorporate feedback from Business and refine mappings or transformation logic as neededData Team (L2C)
11Finalize and approve transformed data as Target Ready Load FileBusiness + Functional (L2C) + Data Team (L2C)
12Handover final file to Load Team or trigger the load via Syniti Load WorkbenchData Team (Syniti), Data Load Team


Transformation Rules

Rule #Source systemSource TableSource FieldSource DescriptionTarget SystemTarget TableTarget FieldTarget DescriptionTransformation Logic
XXXX







































Transformation Mapping

Mapping Table NameMapping Table Description








Transformation Dependencies

List the steps that need to occur before transformation can commence
Item #Step DescriptionTeam Responsible
1Source Data Integrity
- Ensure extracted data is complete, accurate, and consistent.
- Validate that data types and formats align with transformation requirements.
Synithi
2Referential Integrity
- Ensure dependent records are transformed together or in advance
Synithi
3Transformation Logic and Mapping
- Define data mapping rules between source and target schemas.
Data Team
4Performance and Scalability Considerations
- Optimize transformation processes for large datasets.
- Ensure system resources can handle transformation workloads
Synithi
5Logging and Error Handling
- Maintain detailed logs of transformation activities.
- Define error-handling procedures for failed transformations
Synithi


Pre-Load Validation

Project Team

The following pre-load validations will be performed by the Project Team.

Completeness

TaskAction

Validate the record count

Verify that the data extracted from the legacy system is complete and accurate by comparing record counts and contact person against the source system

Validate the mandatory fields

Validate there is value for all the mandatory fields



Accuracy

TaskAction

Validate the transformation

Verify that all transformation rules have been correctly applied and that transformed fields display the expected target values

Validate the extraction

Verify that all copied fields accurately reflect the source system values to ensure the extraction process has correctly transferred the data.




Business

The following pre-load validations will be performed by the Business.

Completeness

TaskAction

Validate the record count

Verify that the data extracted from the legacy system is complete and accurate by comparing record counts and contact person against the source system

Validate the mandatory fields

Validate there is value for all the mandatory fields




Accuracy

TaskAction

Validate the transformation

Validate the fields which require transformation have the value after transformation instead of the original field value

Validate the extraction

Verify that all copied fields accurately reflect the source system values to ensure the extraction process has correctly transferred the data.




Load

The load process includes:

  1. Execute the automated data load into target system using load tool or product the load file if the load must be done manually
  2. Once the data is loaded to the target system, it will be extracted and prepared for Post Load Data Validation

Load Run Sheet

Item #Step DescriptionTeam Responsible
1Load Scope Definition
- Identify the target system and database structure.
- Define data objects (tables, fields, records) to be loaded.
- Establish business rules for data validation.
Data team
2Load Methodology
- Specify the loading tools and technologies (Migration Cockpit, LSMW, custom loading program).
Syniti
3Data Quality and Validation
- Ensure data integrity checks (null values, duplicates, format validation).
- Perform pre-load validations to verify completeness.
- Define error handling mechanisms for load failures
Syniti
4Load Execution Plan
- Establish execution timelines and batch processing schedules.
- Assign responsibilities for monitoring execution.
- Document dependencies on other migration tasks
Syniti
5Logging and Reporting
- Maintain detailed logs of loading activities.
- Generate summary reports on loaded data volume and quality.
- Define escalation procedures for errors
Syniti


Load Phase and Dependencies

Configuration

Item #Configuration Item
XXX




Conversion Objects

Object #Preceding Object Conversion Approach
3011list the exact title of the conversion object of only the immediate predecessor – this will then confirm the DDD (Data Dependency Diagram)




Error Handling

Error TypeError DescriptionAction Taken
1

The value XXX for field XXX doesn't exist

  1. Check the mapping/conversion is done properly in the loading file
  2. Validate the target value is configured/transported in the target system
  3. Reach out to function team to validate the configuration
2

There is mandatory field XXX missing

  1. Validate MDS if the fields are set as mandatory
  2. Validate if there is value in the pre-loading file
  3. Validate if the configuration for the mandatory fields are done properly




Post-Load Validation

Project Team

The following post-load validations will be performed by the Project Team.

Completeness

TaskAction

Validate Record count in the backend

Validate the main tables BUT100 is loaded.

Display Records

Pick up few random BP numbers, and Run the BP Report to validate the BUP001 information can be displayed without any error




Accuracy

TaskAction
Check values in key fields for accuracy

Post-load reports will have the same structure as the load file and some additional columns as required to facilitate the post load validation.

Leverage on tool to create a Post Load report that reports S/4HANA loaded records along with the legacy values side-by-side to allow for 100% check of all these fields in the shortest possible time.

Any mismatch will be reported under the Post Load - Error report.






Business

The following post-load validations will be performed by the Business.

Completeness

TaskAction
Record Count Check

Review the record count report from the Data Team and ensure it is correct by cross-checking with the record count confirmed during Pre-load Business Validations






Accuracy

TaskAction
Spot checkBusiness should choose some business partners, display the contact person with transaction code "BP" and perform comprehensive check on all loaded details and relationship





Key Assumptions

  • Master Data Standard is up to date as on the date of documenting this conversion approach and data load.
  • 3010 is in scope based on data design and any exception requested by business.


See also

Change log

Version Published Changed By Comment
CURRENT (v. 9) Feb 23, 2026 13:24 LEW-ext, Chun Ming Remove CUI portion
v. 56 Feb 11, 2026 10:17 CELEDONIO-ext, Arnold Remouve CUI references for Vendor
v. 55 Dec 19, 2025 09:49 CELEDONIO-ext, Arnold
v. 54 Dec 17, 2025 15:35 CELEDONIO-ext, Arnold
v. 53 Dec 17, 2025 14:51 CELEDONIO-ext, Arnold
v. 52 Dec 17, 2025 12:28 CELEDONIO-ext, Arnold
v. 51 Dec 12, 2025 04:29 LEW-ext, Chun Ming
v. 50 Dec 11, 2025 13:49 LEW-ext, Chun Ming
v. 49 Dec 11, 2025 09:17 CELEDONIO-ext, Arnold
v. 48 Dec 10, 2025 12:42 CELEDONIO-ext, Arnold

Go to Page History

Workflow history

Title Last Updated By Updated Status  
There are no pages at the moment.

  • No labels