? Best practice -- Repare service purchase

Hi Expert,
Who could tell me the best practice for below scenario ?
We want to send parts A to vendor for reparing.
After reparing, the parts is still A in system .
We want to create PO for this, but after goods receipt, we would like reparing fee booked on one Expense G/L , that means the value of parts A will not change.
So how to create this PO ?
      How to issue parts A ?
      How to receipt parts A ?
      How to configure the account determination for repare fee to expense G/L ?
Thanks and Regards
Shubin

Create PO with Item category L. give all required details....
Also Under Service tab mention same  material as  "A" as BOM.
Now do the stock transfer to subcontracting vendor in tcode MB1B with mvt 541..
Now receive the stocks from vendor in MIGO with 101 .
Re:How to configure the account determination for repare fee to expense G/L:  (Create seperate G/L account for this..take help of FI guy)
Hope it helps

Similar Messages

  • Best Practices for Service Entry Sheet Approval

    Hi All
    Just like to get some opinion on best practices for external service management - particularly approval process for Service Entry Sheet.
    We have a 2 step approval process using workflow:
    1 Entry Sheet Created (blocked)
    2. Workflow to requisition creator to verify/unblock the Entry Sheet
    3. Workflow to Cost Object owner to approve the Entry Sheet.
    For high volume users (e.g. capital projects) this is cumbersome process - we looking to streamline but still maintain control.
    What do other leaders do in this area?  To me mass release seems to lack control, but perhaps by using a good release strategy we could provide a middle ground? 
    Any ideas or experiences would be greatly appreciated.
    thanks
    AC.

    Hi,
    You can have purchasing group (OME4) as department and link cost center to department (KS02). Use user exit for service entry sheet release and can have two characteristics for service entry sheet release, one is for value (CESSR- LWERT) and another one for department (CESSR-USRC1) .Have one release class for service entry sheet release & then add value characteristics (CESSR- LWERT) and department characteristics (CESSR-USRC1). Now you can design release strategies for service entry sheet based on department & value, so that SES will created and then will be released by users with release code based on department & value assigned to him/her.
    Regards,
    Biju K

  • Best Practice guide for purchasing - payment card processing

    Hello All,
    \Is there any Best Practice guide for “Payments by credit card”/ “Payment card Processing”.
    The biz process is:
    The purchasing department users purchase goods/services using their corporate credit cards. They obtain a credit card voucher/receipt for the purchase made. The credit card co. turns in the credit card statements/files once in a month  the Accounts Payable  matches the receipts with the statements/files & makes the payments.
    Will reward points.
    Thanks & Regards,
    Arpita

    Hi Arpita,
    You might want to check this link
    http://web.mit.edu/sapr3/docs/webdocs/purchpay/ppCC.html
    http://www.bitpipe.com/tlist/Payment-Processing.html
    http://whitepapers.sapinsideronline.com/view.cfm?session=&white_paper=4
    Thanks,
    Jenny
    award points if helpful

  • Missing IMG steps for Best Practice CRM Service.

    Dear SDN'ers,
    I am working for a client and we are now implementing CRM Service.
    In the Best Practice guide I found IMG step like
    3.3.3.4.     Defining Time Allocation Types,
    3.3.3.6     Defining Availability Template
    3.3.3.8     Defining Service Area
    etc.
    However I cannot find these corresponding transactions in SPRO. They all refer to the path Customer Relationship Management  Workforce Deployment  WFD Server  Business Settings for WFD Server  only In our system this path doesn't excist. It calls IMG transaction like WFM_001 but the system doesn't recognize this IMG activity.
    Please can anybody help me?
    Kind regards,
    Niels

    Hi,
    Have you carried out the prerequisite steps?
    Also chk this path in SPRO
    Customer Relationship Management>Transactions>Settings for Service Processes>Settings for Service Resource Planning>WFM Core-->Make Settings for the WFM Core.
    And also ensure that no RFC connection has been assigned to the WFM Core if you are using it as an add-on in SAP CRM.
    Regards,
    PePe

  • Best Practice - HCM service

    Hi,
        The ESS latest package was uploaded initially into the portal. This package consists of mostly the Webdynpro iviews.
        Later it was decided to use the Best practice, so it is uploaded. Now all the services provided in the Best practice is available in one common folder, except for the ESS. The iviews available in this Best practice are mostly the transaction iviews.
        My query is that, why the HCM (ESS) services are not there under the best practice folder? Is it due to the already uploaded ESS package? What should i do to avail the HCM services of the best practice?
    It's urgent. plz help. All useful answers will be rewarded.

    Thanks Bharathwaj for the reply. Here is the link.
    https://websmp104.sap-ag.de/swdc
    In the website "SAP Software Distribution Center" select the category "Download" -> "Installations & Upgrades" -> "Entry by Application Group" then select "SAP Best Practices" -> "SAP BP PORTALS".
    In this the EP V2.60 version was downloaded.

  • Best practice for service account?

    Hello guys,
    May I ask what's the best practice to have and maintain a service account?
    For ConfigMgr, you may need to have a service account for e.g client install.
    An employee who run this service just depart, and we realize we don't have service account credential left to our knowlege.
    So let say we have to reset it, and reconfigure back the service account with new credential, what's the best practice to have this credential kept in safe and can be retrieved back for future use?
    Do you keep it in a secured email? Secured envelope? How you maintain it in a big organization.
    Please throw me some ideas. Thank you very much :)
    p/s: this issue may not restrict to ConfigMgr only, you may need service account for SQL, IIS and etc.
    ---Pat

    Hi,
    Dfferent customers use different solution, some use applications like this for instance,
    http://keepass.info/
    and save the database of password on a network share.
    Regards,
    Jörgen
    -- My System Center blog ccmexec.com -- Twitter
    @ccmexec

  • Best Practices Web Services - Complex Data Types

    Can someone provide some best practices documentation or info that for customers using CR against web services? Speciffically any information on complex data types such as  String[] or Address.
    Thanks
    Ian S

    And That's what I did.
    name.cfc is the component that has complex data types
    created.

  • Best Practice Web Service Output Mapping (deep structure)

    Hi All,
    My current scenario is as follows:
    In my BPM I consume a Web Service which was created from a Function Module in the Backend.
    This Web Service has the same Data Types as the original BAPI.
    For instance a table containing return values (BAPIRET2).
    When the Web Service inside the process is executed I assume that my return table is filled.
    Based on that return table I want to decide what to do next using a gateway.
    What would be the best way to process the table in a gateway condition?
    The table may contain several entries so I guess a simple not() function does not suffice.
    I hope you do understand my problem here.
    Curiously waiting for your replies,
    Bastian

    Hi Bastian,
    the parallel for each loop feature will come with NW 7.2.
    You will have a new property pane at each activity (automated activity, human task, referenced subflow, and the embedded subflow which will also come with NW 7.1) where you can switch on the looping.
    If you do that, the activity will be started (in parallel) for each line item in a list of data from a data object in the context (the list can also be specified in the new property pane).
    At the end of each activity execution the result can be mapped via append into another DO from the context.
    Unfortunately, this feature is too extensive to be downported to 7.11
    Best regards,
    Oliver

  • Best practice Terminal Services Group Policy AD

    When I started out with Terminal Services on Windows 2000 I used as a guide a book from Todd Mathers called Windows NT/2000 Thin Client Solutions and have been using his recommendations ever since.  We are not planning to go to Windows 2008 and I thought it might be a good time to review our methodology and have a second pair of eyes/experience look over.  I'm not sure if anybody responding will be familiar with the book but here are the steps recommended in the book that we have implemented:
    1) Create a separate Terminal Services OU in the domain
    2) Under the TS OU create two OU's - Terminal Servers and Terminal Server User Groups
    3) Create 3 GPO's and apply to the Terminal Servers OU
    a) TSServers 
    Enable Block Policy inheritance
    Disable User Configuration Settings
    Permission:            Authenticated Users    System  TS-Admins
    Full Control  
    Read                          Allow                          Allow             Allow
    Write                                                              Allow             Allow
    Create Child Objects                                  Allow            Allow 
    Delete Child Objects                                  Allow             Allow
    Apply Group Policy    Allow
    Loopback Policy - replace mode
    Delete Cached Copies of Roaming Profiles
    b) AllTSUsers Policy (Includes Admin)
    Disable Computer Configuration Settings
    Permission:        Authenticated Users    System    TS-Admins
    Full Control                                                                   Allow 
    Read                          Allow                    Allow            Allow
    Write                                                         Allow           Allow
    Create Child Objects                            Allow           Allow 
    Delete Child Objects                            Allow           Allow
    Apply Group Policy    Allow                                       Allow
    Enable: Do Not Track Shell Shortcuts During Roaming
    Enable: Disable UI to Change Menu Animation Settings
    Enable: Add Logoff to the Start Menu
    Enable: Disable and REmove the Shut Down Command
    Enable: Do Not Use the Search-based Method When Resolving Shell Shortcuts
    Enable: No Screen Saver
    Enable: Group Policy Refresh Interval - 1440 (24 hours)
    c) RegularTSUSERS (not including Admins)
    Disable Computer Configuration Settings
    Permission:        Authenticated Users    System    TS-Admins
    Full Control                                                            
    Read                          Allow                    Allow         Allow
    Write                                                        Allow         Allow
    Create Child Objects                           Allow         Allow 
    Delete Child Objects                           Allow         Allow
    Apply Group Policy    Allow                                    Deny
    Wndows Settings\Folder Redirection - I redirect My Documents and Application Data to a network share  
    Administrative Templates\Windows Components\Windows Explorer 
    Enable: Removes the Folder Options Menu From the Tools Menu
    Enable: Hide Hardware Tab
    Administrative Templates\Start Menu & Taskbar 
    Enable: Disable and Remove Links to Windows Update
    Enable: Remove Network & Dial-up
    Enable: Disable Changes to Taskbar and Start Menu Settings
    Administrative Templates\Desktop 
    Enable: Prohibit User From Changing My Documents Path
    Administrative Templates\Control Panel 
    Enable: Disable Control Panel
    Administrative Templates\Systems
    Enable: Disable Registry Editing Options
    I would appreciate if somebody could critique the above for our present 2000 environment - how we might do things different and better - we are still going to be running 2000 for another year - and also offer some guidance as to how we should modify the above for 2008 R2.

    my favorite is:
    user - admin templates - windows components - windows explorer  -Hide this specified drives in My computer
    user - admin templates - windows components - windows explorer  -Prevent Access to drives from My Computer
    user - admin templates - windows components - windows explorer  - Prevent users from adding files to the root of their User Files Folders (I wnat to keep folder redirection effective)
    Martin

  • Highly Required CRM 5.0 Best practices for CRM Service Module

    Dear all,
    I have been searching for CRM 5.0 version best practices in Internet quiete a long period, but could not find anywhere.
    currently SAP is providing only best practices for SAP CRM 2007 version.
    since most of configuration is differing because of Webclient Interface, I request you to refer a source from where I can get the CRM 5.0 Best Practices for Service module.
    Your suggestions and help will be highly appreciated.
    Best regards
    Raghu ram

    Hi Srini,
    <removed by moderator>
    Thank you & Best regards
    Raghu ram
    Edited by: Raghu Ram on Jul 16, 2009 6:09 AM
    Edited by: Raghu Ram on Jul 16, 2009 6:11 AM
    Moderator message please review the rules of engagement located here:
    https://www.sdn.sap.com/irj/scn/wiki?path=/display/home/rulesofEngagement
    Edited by: Stephen Johannes on Jul 16, 2009 8:12 AM

  • Best Practices for Implementing BI7.0

    Dear all,
    We are currently in BI 3.5 and have planned to go for BI 7.0.I have a few questions
    1. Is the BI in Netweaver 2004s is BI7.0?
    2. What are the best practices to go for BI 7.0? I found few documents regarding the Best Practices in service.sap.com
    3. Where can I find more detailed information and documents for implementing BI7.0?
    If you have any document can you please send it to
    (yo - no email addresses in here buddy boy)
    Thanks & Regards,
    Chandran Gansan
    Message was edited by: Ron Silberstein

    Dear Chandran,
      1. Is the BI in Netweaver 2004s is BI7.0?
    >> I read some posts before that the correct term should be SAP Netweaver 2004s; Whereas the SAP BW3.5 is referred to SAP Netweaver 2004. I hope I am not mistaken.
      2. What are the best practices to go for BI 7.0? I found few documents regarding the Best Practices in service.sap.com
      3. Where can I find more detailed information and documents for implementing BI7.0?
    >> Since you have access to the SAP service marketplace, kindly check under the categories: bi, bifaq, sevices & implementation.
      Hope this helps..
      Thanks...

  • Where to download CRM best practices

    Hi, guys:
    I was trying to find the way to download CRM best practices from service.sap.com, however, I cannot find the path to find the document, if you know where it is, would you please let me know?
    Thanks,
    Eric

    Maybe
    Thinking InJava would be a nice place to start.I just checked my library to see whether I own Effective Java (just
    changed that). My first reaction was: "WTF? I have a J2ME book? And
    JDBC, of all things!?" :)lol! In a way I like the idea of a j2me technology stack; I just find the
    realization thereof a totally, dumb mess. Those telecom drones don't
    really want to be compliant so nor will their implementations they
    provide either.
    JDBC is just a necessary evil, no more no less. xml is an invention of
    the devil's bad and nasty sister though ;-)
    kind regards,
    Jos

  • Best Practice for Securing Web Services in the BPEL Workflow

    What is the best practice for securing web services which are part of a larger service (a business process) and are defined through BPEL?
    They are all deployed on the same oracle application server.
    Defining agent for each?
    Gateway for all?
    BPEL security extension?
    The top level service that is defined as business process is secure itself through OWSM and username and passwords, but what is the best practice for security establishment for each low level services?
    Regards
    Farbod

    It doesnt matter whether the service is invoked as part of your larger process or not, if it is performing any business critical operation then it should be secured.
    The idea of SOA / designing services is to have the services available so that it can be orchestrated as part of any other business process.
    Today you may have secured your parent services and tomorrow you could come up with a new service which may use one of the existing lower level services.
    If all the services are in one Application server you can make the configuration/development environment lot easier by securing them using the Gateway.
    Typical probelm with any gateway architecture is that the service is available without any security enforcement when accessed directly.
    You can enforce rules at your network layer to allow access to the App server only from Gateway.
    When you have the liberty to use OWSM or any other WS-Security products, i would stay away from any extensions. Two things to consider
    The next BPEL developer in your project may not be aware of Security extensions
    Centralizing Security enforcement will make your development and security operations as loosely coupled and addresses scalability.
    Thanks
    Ram

  • Best practice for integrating oracle atg with external web service

    Hi All
    What is the best practice for integrating oracle atg with external web service? Is it using integration repository or calling the web service directly from the java class using a WS client?
    With Thanks & Regards
    Abhishek

    Using Integration Repository might cause performance overhead based on the operation you are doing, I have never used Integration Repository for 3rd Party integration therefore I am not able to make any comment on this.
    Calling directly as a Java Client is an easy approach and you can use ATG component framework to support that by making the endpoint, security credentials etc as configurable properties.
    Cheers
    R
    Edited by: Rajeev_R on Apr 29, 2013 3:49 AM

  • Best Practice while creating Contract, Purchase Requisition, Purchase Order

    Hi
    What is the best practice with respect to Contract & Purchase Requisition?
    IN T Code ME31K, there is a button Reference to PReq, meaning that we can create contract with using Purchase Requisition. (We have done the same)
    While creating the Purchase Order using Contract, we could find Purchase Requisition reference in the Purchase Order; similarly when we created the Purchase Order using Purchase Requisition, we could find Contract reference in the Purchase Order.
    I have done the following:
    1. Create a Contract.
    2. Create a Purchase Requisition
    3. Assign Requisition and Create Purchase Order using T Code ME57.
    4. Create Purchase Order
    Here in this case we could find references of both Contract & Purchase Requisition.
    I just want to know what Practice should we adopt / advise while creating Contract, Purchase Requisition. & Purchase Order?
    Regards,

    Hi,
    In ME51N Screen, enter Contract number in the "AGREEMENT" TAB and if more items in the contract, you can mention the item number in the next TAB to the AGREEMENT TAB and then proceed with creating PR by entering other details. This TAB you can find in the 4th column from extreme right end of PR screen.
    Regards,
    Biju K
    Edited by: Bijay Kumar Barik on Sep 10, 2009 2:23 PM

Maybe you are looking for

  • TS1717 The file "Itunes Library itl" cannot be read because it was created by a newer version of iTunes.

    When I launch iTunes from my main account iI get the message: "The file "Itunes Library itl" cannot be read because it was created by a newer version of iTunes." I only get this in this specific user account! My other user account can open and use iT

  • Possible to ONLY install bootcamp from Leopard?

    I recently bought a new iMac that came loaded with Tiger, along with a Leopard disc for $10. I prefer to wait for a while to install Leopard to avoid initial freezing problems on iMacs, etc. but would like to be able to install Boot Camp. Since I hav

  • Forcing a send to VRU label

    Hi all, i would like to know if it's possible to specify which send to vru label icm to send, regards,

  • Not use server.pt in url

    Can i set my site so my users don't need to put the server.pt on their URL? I tried adding it as a default document in IIS to no avail.

  • Mac users having issues with my Site

    I just recently had a Mac user complain to me that my website wasn't working for him http://woodsshop.com/index.htm I'm wondering if the fact I edit my site using CS3 might be his problem?, but that's a wild guess on my part. he said " when I enter y