How to check if the stock has been blocked aganist a project or order....

Hi,
In our business scenario we procure materials against a particular workorder as non-stock (Free text requirement from SRM). Out of these only some will be used and so again we bring this remaining materials to stock and again issue against a new workorder if required. While issuing against a new workorder this materials will be blocked against particular work order.
Since no MRP is run we cannot check the material requiremnts by MD04. In MMBE even though we can see this, we cannot see if it is blocked agaisnt what order adn all (i.e. in detail). Is there any other transaction to view the stock requiremetn list in detail??
Please let me know ASAP.
regards

hi
You have told it is a non stock item (free text coming from SRM) then it is diffucult to track the
Stock in SAP against the Project order.
Regards
G.Ganesh Kumar

Similar Messages

  • STO. How to create the stock in transit if the plant has been block.

    Problem with STO. How to clear the stock in transit if the plant has been block.

    The command builder takes a Select SQL and automatically creates a Insert, Update, and Delete SQL commands.  The database could have Insert priviledge and not Updates and Delete priviledges. But I don't think this is causing the problem.  I suspect
    the Orcacle Client handled an exception that wasn't returned to you code and the client is in an invalid state.  You may need call a new constructor for the client.  I would check the Control Panel : Adminsitrative Tools : Event Viewer to see if
    there were any error messages created when you ran the application.
    jdweng

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •             B_BUPA_GRP
    •             B_BUPA_ATT
    •             B_BUPA_FDG
    •             B_BUPA_RLT•       
    Authorization objects for relationships:
    •             B_BUPR_BZT
    •             B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •             The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •             If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •             You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •             So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

  • HT5129 How can I stop the "MobilMe has been discontinued" message?

    I don't have any published albums; how can I stop the "MobilMe has been discontinued" message coming up all the time?

    Bill,
    Go to iPhoto>Preferences...>Accounts...and remove the MobileMe account. Then go to System Preferences...>MobileMe, and sign out.

  • How to check whether MRP run has been executed for a sales order or not

    Dear Experts,
    In Strategy:20, Make to Order scenario, I have run MRP for sales order in T Code:MD50,
    then how can I check whether MRP run has been executed for a sales order or not.  Is there any report where I can find some indication?
    Thanks and regards,
    Vikas

    Dear,
    In MTO scenario with Planning strategy group 20 in material master .
    After sales order is created, Run MRP , then planned order will be created then go to planned order details in MD04 or MD12 you will get sales order number in assigment tab.
    or check the Table PLAF field  PALTR ,and field name KDAUF its sales order, for all created planned order.
    Regards,
    R.Brahmankar

  • How to get that the invoice has been printed or not?

    Hi Experts,
    I have a issue in Printing Invoice. I have to make 2 copies of an invoice. One is Original and another is Duplicate. I have made that with copy windows. But the requirement is that when the original copy of a selected invoice has been printed then from the second time only the duplicate copy will be printed. How to do that in ABAP? How to get the information that the invoice has been printed or not?
    Regards,
    SURYA

    Hi Surya,
    Try the below approach, i think this is better than the previous approach and takes care of the print from "text menu" as well
    select from z table.
    if sy-subrc eq 0.
      call "SMARTFORM_COPY"
    else.
    While calling the smartform, make sure you import the "JOB_OUTPUT_INFO" parameter,
    and after you call the smartform,
    call "SMARTFORM_ORIG"
    exporting...
    Importing...
    job_output_info = w_job_output_info
    exceptions...
    If sy-subrc eq 0.
      if w_job_output_info EQ 'X'.
        update the Z table.
      else.
        do not update the z table
      endif.
    endif. 
    endif.
    Regards,
    Chen

  • How to verify that the request has been moved to Quality System

    Hi friends,
    I a new abaper and i need ur help in solving this issue.
    I have developed an object and released( as per the suggestions given already in this forum). Its working well and i can see the request in released status in se09.
    No what i really want is , How can i verify that the request has been moved to Quality System by the basis people, assuming that i have only access to dev system.

    Yes, once u release the request, if it is successfullly released will make the request avaialble under released requests
    As an ABAP'er this is enof
    <b>wht abt me Sravanan :-(</b>
    Regards
    - Gopi
    Message was edited by: Gopi Narendra

  • How to check if the user has log in when he log in again?

    Hi all,
    I was wondering how to track if the user has already log in?
    When this user using browser A to log in then he try to log in using a new browser, then hw I am I going to know that, and terminate his session?

    Hello!
    You can try this code if you want that if a user is login at a machine and tries to login from the other, then he can continue his processing at second machine ('cos it will get the high priority) but can not process from the first machine. This code allows to login but only second one will be active.
    <jsp:useBean id="monitor1" scope="application" class="java.util.HashMap"/>
    if(monitor1.containsKey(num)){
    HttpSession oldSession = (HttpSession) monitor1.get(num);
    oldSession.invalidate();
    monitor1.remove(num);
    monitor1.put(num , session);
    But if you want to restrict it at the time of second login then u can use any of the techniques discussed above.
    aNTUMNIHA

  • Against the account has been blocked

    Against the account has been blocked

    There are 2 different commands and 2 different users, they're not tied and changing the pwd from one doesn't affect the other.
    You need to reset the pwd from the CUC admin user, not the OS user.
    http://www.cisco.com/en/US/docs/voice_ip_comm/connection/7x/installation/guide/7xcucig020.html#wp196868
    HTH
    java
    If this helps, please rate
    www.cisco.com/go/pdihelpdesk

  • My mozilla firefox on my desktop brings that the site has been blocked on most of the sites i put in. Help me undo that

    It brings that this site has been blocked due to recent activity that was considered spam

    The Reset Firefox feature can fix many issues by restoring Firefox to its factory default state while saving your essential information.
    Note: ''This will cause you to lose any Extensions, Open websites, and some Preferences.''
    To Reset Firefox do the following:
    #Go to Firefox > Help > Troubleshooting Information.
    #Click the "Reset Firefox" button.
    #Firefox will close and reset. After Firefox is done, it will show a window with the information that is imported. Click Finish.
    #Firefox will open with all factory defaults applied.
    Further information can be found in the [[Reset Firefox – easily fix most problems]] article.
    Did this fix your problems? Please report back to us!
    Sometimes a problem with Firefox may be a result of malware installed on your computer, that you may not be aware of.
    You can try these free programs to scan for malware, which work with your existing antivirus software:
    * [http://www.microsoft.com/security/scanner/default.aspx Microsoft Safety Scanner]
    * [http://www.malwarebytes.org/products/malwarebytes_free/ MalwareBytes' Anti-Malware]
    * [http://support.kaspersky.com/faq/?qid=208283363 TDSSKiller - AntiRootkit Utility]
    [http://windows.microsoft.com/MSE Microsoft Security Essentials] is a good permanent antivirus for Windows 7/Vista/XP if you don't already have one.
    Further information can be found in the [[Troubleshoot Firefox issues caused by malware]] article.
    Did this fix your problems? Please report back to us!

  • How to chek if the username has been taken

    hi all,
    i have a swing panel to indicate user to create his account by entering his user name, password and other data.
    how can i implement the program to check if the user name has been taken
    , then go back to tell user that his user name can not be taken.
    otherwise, go on the store whole data entered by the user.
    thanks

    Sorry I forgot to mention speed is just not an issue
    on a single record lookup.
    rykk
    so it means if you want to check a single record exists or not in db > for 100 times, either you will create a new database connection 100
    times or you will use the connection from pool, I think both the
    cases are slower than doing a lookup in hashtable. Of course it is slower. The point is it does not matter if it is slower as users will be logging on 1 at a time over a period of time. The time to establish a connection (assuming you are not using connection pooling), query for a single record and close the connection is exceptionally quick. This is assuming you have a server that is even close to adquate. The only time to worry is if your server is loaded beyond capacity and any query is degrading other user functions. In normal systems the user will be interacting with the database in all the various functions they perform - it is much more important to worry about efficency in these functions.
    rykk

  • How to check whether the system has eclipse environment: urgent

    Hi gurus
    can you please tell me how to check whether my crm system has eclipse envirionment.
    Thanks
    shashi

    There is no way to check whether a system is used productively or not, I believe what you mean is checking a client is productive or not in an ABAP-stack based system. Remember although a SAP ABAP system is identified by a SID but from a business perspective the system is recognized by a client, as it is a unique business identity.
    Thus, to check whether the client is productive or not in txn SCC4 check the role of the client, it will show you the correct status. The data of SCC4 is stored in table T000, you can also opt to check that.
    - Regards, Dibya

  • Exchange2003 - How to allow a specific sender while the domain has been block from "sender filtering"

    We have a Exchange 2003 SP2 Ent server. And we have blocked a specific domain by adding it on Global Settings - Message Delivery - Sender filtering
    *@abc.com. It has been set for over a few years and until recently one of our user voice out that she can't receive a legitimate mail with
    [email protected] Since there are lots of junk and malicious mail from abc.com, our manager is not willing to remove that domain from sender filtering. How can I exclude that specific address from sender filtering?
    I've try on "Connection filtering -Configure an exception list to the block list service rule" to exclude that RECEIPIENT (To allow the user to receive every mail, buts seems only work for the mail blocked by "block list service" )
    Is there any method to allow that user to receive the specific email address?
    Thanks!

    HI,
    It will not be possible as the filters are applied in the sequence below
    Connection control filter (per SMTP virtual server)
    Connection filtering 
    Recipient filtering
    Sender filtering
    Sender ID filtering
    Intelligent message filtering
    Refer to the below for more detailed explanation
    http://www.msexchange.org/articles-tutorials/exchange-server-2003/security-message-hygiene/order-which-Exchange-2003-SP2-Connection-Filters-applied.html
    Connection control filter (per SMTP virtual server)
    Connection filtering 
    Recipient filtering
    Sender filtering
    Sender ID filtering
    Intelligent message filtering
    Connection control filter (per SMTP virtual server)
    Connection filtering 
    Recipient filtering
    Sender filtering
    Sender ID filtering
    Intelligent message filtering
    Connection control filter (per SMTP virtual server)
    Connection filtering 
    Recipient filtering
    Sender filtering
    Sender ID filtering
    Intelligent message filtering
    Blog: Http://theinfraguys.com
    Follow me at Facebook http://www.facebook.com/theinfraguys
    Please remember to click 'Mark as Answer' on the answer if it helps you in anyway

  • How do I stop the "virus has been detected" emails?

    I am running OS X Server 10.8.2. The Mail Server frequently sends me "A virus has been detected" emails. I want to stop these emails entirely, because the emails are being screened out by my spam filter anyway.
    I turned off mail virus filtering in the Server app, but that hasn't changed this; I still get the alert emails.
    How do I stop my OS X Server from sending me these virus alert emails?

    In the Server app go to the Delivery tab in the Alerts section. Under settings you can turn off the Virus detected alerts.

  • How to check whether an invoice has been paid or not?

    Hi,
        In FI, how should I check whether an invoice is paid fully and also whether it has any residual item?
    And how should I pay an invoice with some residue? Which transaction I should use and what are the steps to do that?
    Since I'm new to FI, any guidance will help me a lot...
    Thanks,
    Priya.

    Hi Priya,
    you create a posting with residual items as follows:
    <b>Incoming payment</b>
    1. Start transaction F-28
    2. Enter all required information and click on <i>Process open items</i>
    3. On the next screen click on the tab <i>Res. items</i>
    4. Make sure that only the items that you want to pay are highlighted ((Net amount appears in blue)
    5. For each line item enter the residual amount that is still to be paid (Example: you have one invoice over 100 USD and 80 USD are paid, you enter 20 USD, since this is your residual that still needs to be paid)
    6. Save
    <b>Outgoing payment</b>
    1. Start transaction F-53
    2-6. is identical to incoming payment
    Regards,
    Claus

Maybe you are looking for