Branding and Encrypted Fields

Dear Abode Support Staff;
Is it possible for me to create my own brand and have no mention of Abobe at all?  Or can I accomplish this by embedding my form on a website and then using the redirect function to cycle back to the website?
I love the product, but the value I will bring to my clients in the education and understanding of how to use the system.  This will take a lot of work on my part.  I would hate for me to do all the training and then have them simply go to Adobe Forms Central and redo all my work (After I've created the design etc).
Can you help me with this?
Also, is there a way to add additonal encryption to a particular field?
Thanks,
Jim Cantoni

If you have a paid account and embed the form within your web page the bottom "Powered By" footer goes away. They won't see our brand in that case.
I don't quite understand your question about encryption. All submissions are encrypted with HTTPS.
Randy

Similar Messages

  • Custom report and encrypted fields

    Hi,
    I am writing a report that display all the Database IT resources in OIM system along with their connection URL, there is no input to the report and the output is just the name of the It resource and URL.
    The report works fine but the result is encrypted for connection URL, the field is encrypted in the OIM DB but I thought if one use reporting functionality of the OIM the result will be de-encrypted but i guess i was wrong.
    Can anyone please suggest how to display such a field unencrypted using reporting interface.
    Thanks,

    Just wanted to clarify that the field (URL) itself is not defined encrypted in the IT resource parameter definition, only the password field is defined encrypted but when you look inside the OIM DB for all the parameters are in either encrypted or hashed.

  • Digital Signatures and Encryption in Yosemite Mail

    After upgrading to Yosemite, I am having difficulty using the Mac Mail app to send digitally signed and encrypted email.
    Before the upgrade to Yosemite, I was able to send signed and encrypted emails using certificate/keys in my keychain using both the Mac Mail app and Microsoft Outlook 2011 for Mac.
    After upgrading, I am still able to send signed and encrypted message in Outlook, but the Mac Mail app gives the following error when I attempt to send a signed email:
    'You don’t have a trusted certificate in your keychain that matches the email address “XXXX@XXXX”. Without a certificate, you can’t sign messages sent from this address.'   (Actual name replaced)
    When I look at my certificates in my keychain, a certificate is available with "Usage: Digital Signature" that has the email address from the error message "XXXX@XXXX" with exact case in the RFC 822 Name.
    Another interesting piece of data that might help track this down is that when I first launch the Mac Mail application, the Mac Mail application is able to successfully decrypt emails that have been previously sent encrypted to me.  HOWEVER, after I attempt to send an email and get the "You don’t have a trusted certificate..." error message, these emails are no longer able to be decrypted.  I get the "Unable to decrypt message" header above the message and the content of the message is just a "smime.p7m".  If I close the mail application and restart it, these encrypted message are once again decrypt-able until I attempt to send a message.
    It almost seems like things are working until mail tries to access the keychain.
    I have attempted to delete my certificate and keys from my keychain and then adding those items again.
    I have attempted to close the mail application and reopen it.
    I have attempted to reboot my computer.

    1.  I want to confirm that this is still an issue for me in 10.10.1 and mail Version 8.1 (1993)
    2.  I have another data point.
    At my office I have wired networking and wireless networking available.  Primarily I utilize the wired networking for access to network drives, etc.
    When using the wired networking, I experience all the problems that have been catalogued in this thread.  Can't sign, can't encrypt, can't close the compose window after the mail program fails to find my certificate.
    However, when I switch to wireless networking before starting the mail application, digital signatures and encryption seem to work!  This is pretty weird behavior.  Make sure to restart mail if you were previously wired.
    Here are some theories:
    Something to do with OCSP?  When I am wired vs wireless I am on different ip subnets and subject to different firewall rule sets.  Perhaps OCSP is trying to determine the status of the certificate and failing? 
    Here are some things I have tested:
    I switched to a different official apple brand thunderbolt to ethernet adapter with no change in behavior
    I disabled wireless and disconnected my wired network.  So no network access at all.  Signatures and encryption work!  The message obviously does not send, but it appears in my outbox and I don't get the signature error.  When I reconnect my wired cable, the message sends successfully and appears as encrypted in my sent folder!
    I have attempted to disable OCSP by using "Keychain Access --> Preferences --> Certificates Tab --> OCSP (OFF) and CRL (OFF)" but this hasn't made a difference in the behavior of wired networking.
    Ran a TCPDUMP on traffic to the OCSP service but didn't see any traffic when I attempted to send a message and received the signature error
    I am pretty stumped on this.  This is very odd behavior
    Does anyone else experience this behavior?

  • Encrypt fields in Oracle 8.1.6 ??

    Hi. Has anyone tip how to encrypt a field in oracle 8.1.6.
    /Christer

    I am giving some example on this package.
    Example :
    =======
    -- encrypt.sql
    -- demonstrates the use of the dbms_obfuscation_toolkit by
    -- prompting a user for a password and encrypting and decrypting
    -- the data
    set serveroutput on;
    CLEAR BUFFER
    PROMPT Please enter a password - Must be 8 characters !
    PROMPT
    ACCEPT PASSWD
    DECLARE
    input_string VARCHAR2(16) := '&PASSWD';
    raw_input RAW(128) := UTL_RAW.CAST_TO_RAW(input_string);
    key_string VARCHAR2(16) := 'keepthesecretnum';
    raw_key RAW(128) := UTL_RAW.CAST_TO_RAW(key_string);
    encrypted_raw RAW(2048);
    encrypted_string VARCHAR2(2048);
    decrypted_raw RAW(2048);
    decrypted_string VARCHAR2(2048);
    error_in_input_buffer_length EXCEPTION;
    PRAGMA EXCEPTION_INIT(error_in_input_buffer_length, -28232);
    INPUT_BUFFER_LENGTH_ERR_MSG VARCHAR2(100) :=
    '*** DES INPUT BUFFER NOT A MULTIPLE OF 8 BYTES - IGNORING EXCEPTION ***';
    double_encrypt_not_permitted EXCEPTION;
    PRAGMA EXCEPTION_INIT(double_encrypt_not_permitted, -28233);
    DOUBLE_ENCRYPTION_ERR_MSG VARCHAR2(100) :=
    '*** CANNOT DOUBLE ENCRYPT DATA - IGNORING EXCEPTION ***';
    -- 1. Begin testing raw data encryption and decryption
    BEGIN
    dbms_output.put_line('> ========= BEGIN TEST RAW DATA =========');
    dbms_output.put_line('> Raw input : ' | |
    UTL_RAW.CAST_TO_VARCHAR2(raw_input));
    BEGIN
    dbms_obfuscation_toolkit.DESEncrypt(input => raw_input,
    key => raw_key, encrypted_data => encrypted_raw );
    dbms_output.put_line('> encrypted hex value : ' | |
    rawtohex(encrypted_raw));
    dbms_obfuscation_toolkit.DESDecrypt(input => encrypted_raw,
    key => raw_key, decrypted_data => decrypted_raw);
    dbms_output.put_line('> Decrypted raw output : ' | |
    UTL_RAW.CAST_TO_VARCHAR2(decrypted_raw));
    dbms_output.put_line('> ');
    if UTL_RAW.CAST_TO_VARCHAR2(raw_input) =
    UTL_RAW.CAST_TO_VARCHAR2(decrypted_raw) THEN
    dbms_output.put_line('> Raw DES Encyption and Decryption successful');
    END if;
    EXCEPTION
    WHEN error_in_input_buffer_length THEN
    dbms_output.put_line('> ' | | INPUT_BUFFER_LENGTH_ERR_MSG);
    END;
    dbms_output.put_line('> ');
    END;
    Result :
    ======
    SQL> start encrypt
    Please enter a password - Must be 8 characters !
    wildwind
    old 2: input_string VARCHAR2(16) := '&PASSWD';
    new 2: input_string VARCHAR2(16) := 'wildwind';
    ========= BEGIN TEST RAW DATA =========
    Raw input : wildwind
    encrypted hex value : 28EAA8E9E2CEA710
    Decrypted raw output : wildwind
    Raw DES Encyption and Decryption successful
    PL/SQL procedure successfully completed.
    null

  • Issue while Signing and Encrypting the PDF Document.

    Hello,
    I am developing one component in VC++(MFC) which signs and encrypts the pdf documents.
    When i sign and encrypt pdf document using my component, I am getting following error while opening the document in Adobe Acrobat
    Error during signature verification
    Unexpected byte range values defining scope of signed data.
    Details: The signature byte range is invalid
    But if i open that document in binary mode and calculate the byte range its looking correct.
    The Process for signing and encrypting the PDF document is as follows :
    1)Prepare the PDF document for signing (Add Annotation objects,n0,n2
    layers,create blank signature field,new xref section etc.)
    2)Encrypt the whole document(Password based encryption).
    3)Put the ByteRange values.
    4)Write the signature in blank signature field.
    If i just perform encryption(128 bit RC4 Algorithm) on the pdf document its working fine.Only after adding the signature objects i am getting above error.I think it means something is wrong in signature related objects,but i am not able to recognize the exact problem.
    So what can be the issue?
    Please Help
    Thanks in Advance
    Priyanka

    I am sending the Sample Files
    blank.pdf file is a original file
    http://www.2shared.com/file/4677649/3f341d92/blank.html
    step 1: I am adding Signing object(without data in Contents<> key) in
    blank.pdf file.
    Output File is Prepared-blank.pdf
    http://www.2shared.com/file/4677648/48332d04/Prepared-blank.html
    step 2: Sending Prepared-blank.pdf file for encryption.
    Output File is SignednEncrypted-blank.pdf which is Encrypted and Signed.
    http://www.2shared.com/file/4677647/d88c3095/SignednEncrypted-blank.html
    Password for opening SignednEncrypted-blank.pdf is : "a".
    Please help.
    Thanks.

  • Read-only AND Encrypted

    I am using Acrobat XI Pro: is there a way to make a file read-only AND encrypted?

    Folks,
    I may have found a way to create a pdf document with Acrobat XI Pro that is read-only AND encrypted. Please let me know if I have indeed succeeded or not, thank you!
    The steps that I follow to create the read-only AND encrypted pdf document are as follows:
    Create a plain pdf document, from MS Word for example
    Sanitize Document
    Create Form without fields
    Close Form Editing
    Encrypt with Password
    Save
    Save As Other… => Reader Extended PDF... => Enable More Tools (includes form fill-in & save)…
    I as a not-very-sophisticated-computer-user did not find a way to hack difficult to detect changes - such as the insertion or deletion of the word 'not' - into the resulting pdf document. But again, please let me know if you DO find a way to hack the resulting pdf document, thank you!
    P.S. I think the resulting pdf document is essentially an encrypted form, albeit one without fields.

  • I keep getting a msg that I am entering an encrypted field

    Every time I open the Firefox Beta 4, I get a msg that I am entering an encrypted field and that this can be easily seen by third party users. What is causing this?

    Sometimes there are just server problems with the App Store. Only thing that I can offer is to wait a day or so and try again and, if still no luck, contact the App Store support folks - http://www.apple.com/support/mac/app-store/.
    Good luck,
    Clinton

  • Mesage-Level Signing AND Encrypting Web Services?

    Hello,
    I have a Web Service on a Weblogic 9.2 that is able to encrypt or sign it's output messages but when I want to use both together I get the following error:
    WSSecurityException: Signature failed to validate. Reference: #Body_B1Zi6a4UPGCpLPRh does not validate.
    Could this be an ordering problem of signing and encryption and do I have any influence on what should be done first?
    By the way signing and encrypting input messages from a consumer works fine. I'm not using any user defined ws-policy files.
    thanks for help
    spunti999

    I found out now that encryption alone does not work properly as I thought it would. The messages look fine on TCP-Monitor and I get no Exception or error message but the response content is empty, all fields are null.
    Does anybody know if there is a bug with empty encrypted responses? (Sending and encrypted Request to the service works and it's content fields are not empty.)
    regards
    spunti999
    Edited by spunti999 at 08/10/2007 3:38 AM

  • Credit Card config and encryption

    Hi frnds
    I would appreciate if anyone can provide the config steps for credit card and also the step for encrytion. If you have a doc on it then please mail it to [email protected]

    hi
    CREDIT CARDS
    Go thr below links:
    PAYMENT CARDS:
    http://help.sap.com/printdocu/core/Print46c/en/data/pdf/SDBILIVPC/SDBILIVPC.pdf
    http://help.sap.com/saphelp_erp2005vp/helpdata/en/93/745309546011d1a7020000e829fd11/frameset.htm
    Overview
    This document attempts to explain in the brief the credit card processing in SAP.
    SAP provides a flexible and secure payment card interface that works with the
    software of selected partners that provide merchant processes and clearing house
    services. In SAP the credit card processing is integrated with the sales and
    distribution module.
    Payment card configuration
    Much of what is required for credit card processing to work with VISA, Master
    Card, and American Express is already set up in SAP.
    For all credit card configurations refer to
    Define Card Types
    Transaction SPRO IMG &#8225; Sales and Distribution &#8225; Billing &#8225; Payment Cards
    Here we define the type of cards that can be used in the system. A four-letter
    code is given for each card type. E.g. MAST for Master Card, VSAJ for Visa
    Japan. A function module for checking the card number is also specified here.
    1. Define Card Types
    Credit Card Configuration And Processing In SAP
    Maintain Card Categories
    (a) Define card Categories: Here we specify the card category of the
    payment card. With this the system automatically determines the card
    category when you enter a card number in master data or sales
    documents.
    (b) Determine card categories: Here we specify the acceptable number
    ranges for different card types. Also card categories are assigned to the
    card types. Even though SAP comes with card checking algorithms
    (Function Modules) for standard card types this configuration setting
    is particularly useful to those cards that do not contain any standard
    checking algorithm already set up in SAP.
    2. Determine Card Categories
    Maintain Payment Card Plan Type
    In this step, you assign the payment plan type for payment cards, the payment
    card plan type, to all sales document types in which you will be using payment
    cards. You cannot process payment cards if you have not made this assignment
    The standard system contains payment plan type 03 for processing payment
    cards. 3. Show the screen where this assignment is done.
    Credit Card Configuration And Processing In SAP
    3. Maintain Payment Plan Type
    Maintain Blocking Reasons
    In this step, you define blocking reasons for payment cards. You enter these in
    the payer master record to block cards. The standard system contains blocking
    reason 01 for lost cards.
    Risk Management for Payment Cards
    Transaction SPRO IMG &#8225; Sales and Distribution &#8225; Billing &#8225; Payment Cards
    &#8225; Authorization and settlement &#8225; Risk Management for payment cards.
    Risk Management plays a central role within Sales, providing you with checks
    and functions to minimize your credit risk. In addition to letters of credit and
    export credit insurance, payment cards are among the payment guarantee forms
    that you can use to insure payment for sales order items. SAP comes with predefined
    payment forms of guarantee as shown below. Customer can also
    maintain other forms of payment suited for their line of business.
    Credit Card Configuration And Processing In SAP
    Define forms of payment guarantee
    3. Define forms of payment guarantee
    Maintain payment guarantee procedures
    In this step, you define Payment guarantee procedure. These procedure controls,
    which form of payment guarantee, are valid for a particular customer, and for a
    particular sales document type.
    The various settings done under this configuration are
    Define payment guarantee procedures
    Maintain customer determination procedure
    Maintain document determination procedure
    Assign sales document types
    Determine payment guarantee procedures
    Maintain authorization requirements*
    Here requirements* are set to tell the system how and when to carry out
    authorization when a sales order is saved. SAP comes with two requirements
    Form routine 1. Carry out authorization only when the sales document is
    complete. The system carries authorization when the order is saved.
    Form routine 2. Carry out authorization only when the sales document is
    complete, but the authorization for all the complete documents is carried out in
    batch.
    Additional requirements* can be assigned here as per the business requirements.
    *Requirements are ABAP/4 code. Requirements for various functions can be accessed using transaction VOFM
    Credit Card Configuration And Processing In SAP
    4. Maintain Card Authorization Requirements
    Maintain Checking Groups
    How and when authorizations are carried out depends on the setting you make in
    the customizing for maintain checking group routines.
    The three main settings that influence authorization are:
    a) Authorization requirements
    b) Authorization horizon
    c) Preauthorization
    There are two settings under this setting.
    Define checking group: Here a checking group is defined and the
    authorization requirement (described in the previous section), Authorization
    horizon (described below) and preauthorization settings are done for this
    checking group.
    5. Define Checking Group
    Credit Card Configuration And Processing In SAP
    Here you can see a checking group C1 is defined with the authorization
    requirement 902. Checking the pre-authorization tells the system to carryout preauthorization
    if the order fulfillment date falls outside the horizon. The
    authorization horizon specifies the number of days before the material
    availability date, or billing date, that the system is to initiate authorization. If a
    sales order is saved within the authorization horizon, the system carries out
    authorization immediately. If a sales order is saved before the authorization
    horizon comes into effect, the system does not authorize at all, or carries out
    preauthorization.
    6. Preauthorization Concept
    In this example, the system has been set to authorize one day before delivery
    creation. The system does not carry out authorization when the order is saved on
    Day 0, rather on Day 2. Note that the authorization validity period has been set to
    14 days in Customizing IMG&#8225; Authorization and settlement&#8225; Specify
    authorization validity periods. The transaction will have to be reauthorized if
    delivery activities take longer than 14 days.
    Assign checking groups: Here the checking groups defined earlier are
    assigned to different sales document types as shown 8.
    Specify authorization validity periods
    Here number of days that an authorization can remain valid for different card
    types are maintained. Refer to 9.
    Credit Card Configuration And Processing In SAP
    8. Assign checking groups
    9. Assign validity period for authorization for different card types
    Credit Card Configuration And Processing In SAP
    Account Determination
    Transaction SPRO IMG &#8225; Sales and Distribution &#8225; Billing &#8225; Payment Cards&#8225;
    Authorization and settlement &#8225; Maintain Clearing House
    In the following steps, you set the condition technique for determining
    clearinghouse reconciliation accounts for authorization and settlement. The
    system uses the entries here to determine the clearing account for the payment
    card charges. When settlement is run, the postings in the receivable account for
    the payment card will be credited and a consolidated debit will be created and
    posted to the clearinghouse account. These accounts are a special type of general
    ledger account that is posted from Sales and Distribution.
    Here, you maintain:
    &#8226; Maintain field catalog.
    &#8226; Condition tables and the fields that they contain
    &#8226; Access sequences and condition types
    &#8226; Account determination procedures
    &#8226; You then assign these accounts to condition types.
    Add to field catalog
    Here you maintain the fields that can be used in the condition table. 10.
    Shows the transaction to maintain the field catalog.
    10. Maintain Field Catalog.
    Maintain condition tables
    Here condition tables are maintained with fields that are added to the field
    catalog. SAP comes pre-configured with two condition tables 4 and 6. Refer
    11.
    Credit Card Configuration And Processing In SAP
    11. Maintain Condition Table
    Maintain access sequences
    In this step we define an access sequence and link the access sequence with the
    condition tables.
    Here an access sequence is defined. SAP comes with the access sequence A001.
    12. Define Access Sequence
    Once the new access sequence is defined, it is linked to the condition tables as
    shown in the next screen.
    Credit Card Configuration And Processing In SAP
    13. Maintain Access For Access Sequence
    Selecting an access and clicking fields will display the fields for the selected
    access as shown below for access 10 as shown above.
    14. Display Access Fields
    Maintain condition types
    Here condition types are defined and the access sequence to linked to it.
    Condition types are contained in account determination procedures and control
    which access sequences the system uses to find condition records.
    These are The condition tables.
    Credit Card Configuration And Processing In SAP
    15. Define condition type
    Maintain account determination procedure
    In this step an account determination procedure is defined and linked to the
    condition type (which in turn is linked to the access sequence).
    Define account determination procedure
    16. Assign account determination procedure.
    Here an account determination procedure CC01 is defined and the condition type
    CC01 is assigned to it.
    Access sequence linked to the condition type
    Credit Card Configuration And Processing In SAP
    Assign account determination procedures
    In this customizing the previously set up account determination procedure is
    assigned to different billing documents.
    Assign Accounts (G/L)
    G/L accounts are assigned here for the combination of Sales organization, Card
    type, chart of accounts and condition types as shown in the 17.
    17. Assign G/L accounts
    Set authorization / settlement control per account
    Each G/L account is assigned an authorization and a settlement function module.
    The system will read the configuration a call the authorization and settlement
    function module during authorization and settlement respectively.
    Credit Card Configuration And Processing In SAP
    18. Set Authorization and settlement function module
    Maintain merchant IDs per account
    A merchant may have one or more IDs for each clearinghouse with which it does
    business. Here, you assign these different merchant IDs to their related
    receivables accounts.
    19. Assign Merchant ID&#8217;s
    Credit Card Configuration And Processing In SAP
    Authorization and Settlement in SAP
    20. Sales Order Cycle With Credit Card Authorization
    When an order is placed through the front-end system, the order information,
    credit card information, billing information, shipping information is passed to
    SAP. SAP processes the order calculates the taxes, the shipping costs and reads
    the configuration information settings and executes the function module setup as
    described in Fig. 18. The function module formats the data and makes a RFC *
    call to the payment application**.
    The payment application screens the order for fraud, encrypts the data and
    communicates with the third party processor who in turns communicates with
    the card association and card issuer.
    *RFC (Remote Function Call)
    *Payment Application: Middle ware between SAP and third party processor/bank.
    Credit Card Configuration And Processing In SAP
    The third party processor responds back with the response whether the
    transaction is approved or declined or referred.
    Note: When any item in the order does not have a confirmed quantity, then
    authorization is not carried out for the full amount. A small dollar amount
    usually ($1) is used as the authorization amount. During the rescheduling run
    the system will check for the material availability. If the material can be
    delivered within the horizon date, a full authorization for the order is carried
    out.
    Approved: When the credit card transaction is approved the systems checks for
    the material availability, confirms the material for the ordered quantity and saves
    the order.
    Declined: The material availability check for the material is not made, and the
    order is rejected.
    Referred: The order is saved and is blocked for delivery. In this situation is
    merchant calls the bank checks for the available credit on the card and a manual
    authorization is carried out.
    21. Sales Order Entry Screen in SAP
    Payment Card
    Information
    Credit Card Configuration And Processing In SAP
    The first line in payment card screen is the card check performed by SAP system,
    using the card check algorithm function module as described in 1. And the
    remaining lines represent the actual authorizations that are carried out.
    22. Payment Card Screen
    Path Header &#8225; Payment Cards.
    Settlement
    Legally the merchant can charge the credit card after the order has been
    completely processed. In SAP this happens after a delivery is created and the
    goods has been shipped. In case there is not enough authorization for the order
    to be delivered, the system goes out the get the authorization for the remaining
    amount.
    In SAP settlement is initiated using the transaction FCC1. All the valid
    authorization is submitted in a batch to the payment application at scheduled
    intervals as specified by the third party processor.
    The payment application encrypts this data and communicates with the third
    party processor. The third party processor checks if the settlement request has a
    valid authorization against it. The third party processor then transfers the fund
    from the cardholder&#8217;s bank to the merchant bank.
    Authorization
    Response
    Credit Card Configuration And Processing In SAP

  • DSO - What key fields and data fields in dso

    Hi experts,
    I need to create a dso in between the cube and 2 data sources(2lis_11_vaitm, 2lis_12_vcscl) to stage the data. My question is: what key fields and data fields to choose for the dso? is there a standard dso to copy? please explain in detail the model to set up, whether to connect both the ds's to dso and then to cube or one ds to dso and the other to the cube. more details will help.

    Check this for standard DSO:
    http://help.sap.com/saphelp_nw04/helpdata/en/43/fcdc387f34384f94c3227baf3837a8/content.htm
    Thanks...
    Shambhu

  • Infoset Join condition on Key feilds and data fields

    Hi Guys,
    I have a requirement to biuld the Info set with join conditon on two DSO's  the info objects which i am using in the JOin condition are defined as data fieds in one DSO and defined as key fields in another DSO, is it possible to define join condition on key fields and data fields.
    The two info objects are                
                           0AC_DOC_NO
                           0ITEM_NUM
    These two info objects are defined as  data fields in DSO :   0LIV_DS1   Invocie verificaion
                                                            key fields in DSO:    0FIAP_0o3 FI AP Line Item
    Please suggest me is it possible to define join the condtion on the data fields and key feilds.
    Thanks
    Best regards
    SG

    Hi
    yes you can create join, you will get any issue in reporting level.
    example: Say i want to create Info Set on 0MATERIAL and Sales DSO.
    In 0MATERIAL Info Object it is key filed, but in my DSO 0MATERIAL is data field.Still we can create
    Creation of join is dependent on fields common in your source objects.
    check out the below document
    http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/2f5aa43f-0c01-0010-a990-9641d3d4eef7?QuickLink=index&overridelayout=true
    Regards,
    Venkatesh
    Edited by: Venkateswarlu Nandimandalam on Sep 27, 2011 2:26 AM

  • Key fields and data fields in a DSO  ??

    i have a question regarding key fields and data fields in a Standard DSO...
    i am using 2 datasources to build a open sales report 2LIS_11_VASTH  and  2LIS_11_VASTI   i am pulling in data from these 2 data sources to a DSO and i am wondering what infoobjects should be in the key fields and data fields .....does this reflect back to table VBUK and VBUP tables and does the key field in the DSO have to be the key fields in VBUK and VBUP tables  ????  or what really should be included as key fields and data fields   ????  
    please help....

    If you look at the various SD tables, VBELN and POSNR are commonly used as the document number and document line item.
    For VBAP and VBUP, it's referring to the Sales Order Line Item with the columns VBELN and POSNR as the key for both tables. However, if you look at the LIPS table, which is the Delivery Line Item table, it too has VBELN and POSNR as the key. Likewise, the VTTP table, which is the Shipment Line Item table, also has VBELN and POSNR as the key.
    While using RSOSFIELDMAP as a map is a fairly good "rule of thumb", it still needs to be used with a level of skepticism.

  • Prerequsites for deciding Key fields and data fields

    Hi
    I would like to know the criteria to decide upon KEY fields and Data fields for an infoprovider.

    Hi,
    What is a Key field in a Database and How should I choose one?
    Keys are crucial to a table structure for many reasons, some of which are identified below:
    They ensure that each record in a table is precisely identified.
    They help establish and enforce various types of integrity.
    They serve to establish table relationships.
    Datafields may be Charecteristics and it may be keyfigures
    Regards,
    Marasa.

  • Key Fields and Data Fields in ODS

    Hi Guru's ,
    Can u Explain what are Key Field's and Data Field's in ODS,and How they work.
    Thanx in Advance.

    Hi Pradeep,
    An ODS’ key fields forms a unique combination of chars according to which data in the ODS will be summed up. Data fields are additional fields, chars or key figures.
    For example, you have the following key fields:
    Doc No, Doc line item (item no in the doc) and you load the following data:
    Doc# Item# Amount CALDAY
    1234  1        100       26.09.2005
    1234  1        150       27.09.2005
    1234   2        300      27.09.2005
    1235   1        400      27.09.2005
    The first two rows with the same key fields (1234-1) will be aggregated and into ODS will go amount of 250.
    What I said is true if for Amount key figure the ‘Add’ option is set.
    But if you set an ‘Overwrite’ option, then the second record will overwrite the first one and only amount of 150 will go to ODS!
    But if CALDAY is also a key field, then into ODS will go all records without any aggregation, because key fields combination is different for all records.
    So, ODS’ key fields choice and KFs settings are very important for data aggregation in the ODS.
    Best regards,
    Eugene

  • Data fields and key fields

    Hi,
    Data fields and key fields are same as Characteristcs and key figures? Or they are diffrerent?
    Thanks,
    Radha

    HI
    Key Fields =  Acts as Primary Key for The ODS like Primary of Tables in R3.
    Data fields =  Apart from Key fields We consider rest as data fields.
    Ususally we use Characteristic info Objects and Dates in Key Fields and Key figures in Data fields.
    It's decisive factor for overwriting property of ODS or DOS.
    Hope this helps.
    Regards,
    Rangzz
    Edited by: Ranganath Kodiugane on Feb 7, 2009 12:14 PM

Maybe you are looking for

  • How do I find what's filling up my Startup Drive?

    I have a small (20g) drive that is supposed to be just for system and applications, but somehow it is filling up -- all my media and data files are elsewhere.... other than searching through every folder, is there a way to identify what is taking up

  • How do I install Camera Raw 4.6 ?

    I have PS CS3 and a Nikon D90, To open the RAW (NEF) files I obviously need to install a compatible version of camera raw which is 4.6 (CS3 is camera raw 4) I have downloaded camera raw 4.6 from adobe website but it makes no difference, I still cant

  • Connecting Firewire 400 Drives to new iMac...

    Hi all, I just tried connecting two external drives to my new iMac using the FW400-to-FW800 and FW800-to-Thunderbolt cables. When I plugged the last bit into my new iMac, however, my Magic Mouse and keyboard stopped working. Did I do something wrong?

  • How to call same form by different performs as below?

    Hi, i want to use a Form get_data by calling Perform get_data twice with two different internal tables as below perform get_data    tables   it_upload                             using    tab_name                             changing it_material.  it

  • My imovie opens in the dock, but then disappears off the screen - top right hand side, What's happening?

    Hi iMovie opens in the dock, but then seems to disappear off to the top right hand side of the screen and I can't find a way of recovering it?   Suggestions please