How to work on the user PBO Include MV45AOZZ.

Hello Experts,
The user PBO Include MV45AOZZ.
Will this Include MV45AOZZ trigger on VA01. If yes when is this triggered.
I need to read the values from the table control on sales tab in VA01.
eg item, material, ord quan, item cat etc.
after I click on button save.
Will this include MV45AOZZ help me to do this ?
Please help.
Regards,
Ranjith N

Hi
you can use include MV45AFZZ  for the same purpose. you  can use below form
FORM USEREXIT_SAVE_DOCUMENT_PREPARE.
ENDFORM.
this form triggers before saving of Sales Document. Here also you can read sales order item data
in table from internal table XVBAP.
Hope This Will Help you.
Regards,
Shyam.
*eject

Similar Messages

  • How to find all the user exits includes ,

    Hi All ,
    I need to find all the includes which are created for purpose of implementing user exits , I know they all start with ZX* but where to get the list .
    THank you all
    Vinay Kolla

    Hi Vinay....
    Just excute following program in your ABAP Edter....
    ( Input parameters: T'CODE and User exit type.)
    >TABLES: MODSAP, MODACT, TSTC.
    >
    >PARAMETERS: INPUT1 LIKE TSTC-TCODE DEFAULT ' ',
    >           INPUT2 LIKE MODSAP-TYP DEFAULT ' '.
    >
    >DATA: SEARCH1(6),
    >      SEARCH2(3),
    >      SEARCH3 LIKE MODSAP-MEMBER.
    >DATA : FIRST_ROW VALUE 'Y'.
    >
    >CONCATENATE: '%' INPUT1 '%' INTO SEARCH1,
    >             '%' INPUT2     INTO SEARCH2.
    >
    >SELECT * FROM TSTC WHERE TCODE LIKE SEARCH1.
    >  FIRST_ROW = 'Y'.
    >  CHECK TSTC-PGMNA NE SPACE.
    >  CONCATENATE '%' TSTC-PGMNA '%' INTO SEARCH3.
    >  SELECT * FROM MODSAP WHERE TYP LIKE SEARCH2
    >                       AND MEMBER LIKE SEARCH3.
    >    SELECT SINGLE * FROM MODACT WHERE MEMBER = MODSAP-NAME.
    >    IF FIRST_ROW EQ 'Y'.
    >      WRITE: /0 TSTC-TCODE, 6 TSTC-PGMNA, 16 MODSAP-NAME, 32 MODSAP-TYP,
    >                                       45 MODSAP-MEMBER, 70 MODACT-NAME.
    >      FIRST_ROW = 'N'.
    >    ELSE.
    >WRITE: /16 MODSAP-NAME, 32 MODSAP-TYP, 45 MODSAP-MEMBER, 70 MODACT-NAME.
    >    ENDIF.
    >    CLEAR : MODSAP, MODACT.
    >  ENDSELECT.
    >  IF SY-SUBRC NE 0.
    >    WRITE : /0 TSTC-TCODE, 6 TSTC-PGMNA, 30 'No exits found'.
    >  ENDIF.
    >  CLEAR TSTC.
    >ENDSELECT.
    >
    >END-OF-SELECTION.
    >  CLEAR: SEARCH1, SEARCH2, SEARCH3.
    Thanks,
    Naveen Inuganti.

  • Will geolocation only work if the users device is set up to share their location in Adobe Captivate 8?

    Just wonder how geolocation works if the user has to turn on any settings for this to work correctly. Thank you!

    He needs his device (that has to be able to do it) to allow access to his location of course.That is something the user can disable/enable.

  • How do I change the User Agent for Safari on my iPad?  I need this for a specific website for work.

    How do I change the user agent for Safari on my iPad?  I know how to do it on my desktop version, but I need it for my iPad.

    You can rename the iPad here:
    Settings - General - About - Name
    For Siri make sure he has himself as a contact in the Contacts app then:
    Settings - General - Siri - My Info and select his contact info

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •             B_BUPA_GRP
    •             B_BUPA_ATT
    •             B_BUPA_FDG
    •             B_BUPA_RLT•       
    Authorization objects for relationships:
    •             B_BUPR_BZT
    •             B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •             The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •             If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •             You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •             So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

  • How to find out the user who modified formula

    Hi  Experts,
    How can I find the user ID who modified the formula in transfer rules?
    Thanks
    Manish

    you can check the infosource status, menu - extras - infosource status. there you will find info abt the comm and transfer structure, active and modified version, last changed, date, time etc. I dont think it would work if the structure has been changed after the structure has been changed with the formulas.

  • I was looking at the "Find my iPhone" app and I have a doubt regarding how it works for the macbook. In order to detect the location, the macbook should remain signed into iCloud. What if the thief logs out of iCloud. Would we able to locate the macbook?

    I was looking at the "Find my iPhone" app and I have a doubt regarding how it works for the macbook. In order to detect the location, the macbook should remain signed into iCloud. What if the person who has stolen my macbook logs out of iCloud.
    It should work fine for iPhone/iPad because we can enable "Restrictions" to prevent the user from signing out of iCloud. Do we have simialr settings for the macbook?
    Thanks,

    If it's not on the device list, it indicates that someone has gone to Find My iPhone on icloud.com and manually deleted it from the device list (as explained here: http://help.apple.com/icloud/#mmfc0eeddd), and it has not gone back online since (which would cause it to reappear on the device list; Find My iPhone has been turned of in settings on the device; the iClolud account has been deleted from the device; or the entire devices has been erased and restored.
    Unfortunately, there's no other way to track the phone other than through Find My iPhone.  You could call your carrier and see if they would blackliste it so at least the theif couldn't use it.

  • How to find out the users currently logged into ODI

    Hi all,
    How to find out the users currently logged into ODI Work Repository?
    Thanks.

    Hi,
    It stores all the final queries in work rep table i.e "SNP_SESS_TXT_LOG" and the column is "TXT".
    Here u can find all the ODI bkp process queries.Pls specify the SESS_NO for purtivular task u want to check which u can get this in ODI operator.
    I dont think so that it will keep the substituted value(because its implicit and temporary process) but it will keep all the default values in the table SNP_VAR_SESS and the column is "DEF_V".
    Thanks,
    katukota

  • The Ipad2 Application Data folder is taking up huge space in C: Drive. How can I shift the User Application data for iPad2 to another Drive?

    The Ipad2 Application Data folder is taking up huge space in C: Drive. How can I shift the User Application data for iPad2 to another Drive?

    Thanks a lot for the response. Yes, I am checking my C: drive data thoroughly now, including the hidden folders, to ascertain if something else can be moved, as per your suggestion.

  • How to determine that the user/ pernr is comp cord?

    Hi,
    In tcode pa30 i see there is Comp Cord field. so these are the HR persons right which use the three digits numbers.
    So my question is how to determine that the user/ pernr is comp cord?
    I want to create the fm and pass user id as import and want to find out where this user is belongs to comp coordinator or not.
    i do see some entry in the T526 table but not sure, how it work.
    Regards
    Ali

    hi ali,
    SACHX is the field you are looking for ..
    regards
    Manthan Raja

  • How Can I record the user's logging time?

    How Can I record the user's login time?I create a table containing some column such as record_id,username,start_time,end_time,period.How can I create a process on logging in to record the start_time and a process on logging out to record the end_time?
    Thanks for any help.

    you can refer to the name of the currently logged in user using :APP_USER. to capture the login info, i'd add an htmldb process to my app that fired "After Authentication" and simply inserted :APP_USER and sysdate into my logging table. for the logout case, you could change the "Logout URL" of your current authentication scheme to one that does whatever it's currently doing plus the logging. so i Logout URL of...
    wwv_flow_custom_auth_std.logout?p_this_flow=&APP_ID.&p_next_flow_page_sess=&APP_ID.:101:&APP_SESSION.
    ...and i changed it to something like...
    my_schema_name.my_logout?p_user=&APP_USER.&p_app=&APP_ID.&p_session=&APP_SESSION.
    ...where my_logout was...
    create or replace procedure my_logout(
    p_user in varchar2,
    p_app in varchar2,
    p_session in varchar2) as
    begin
    insert into my_logging_table values (sysdate, 'logged out as '||p_user);
    wwv_flow_custom_auth_std.logout (
    p_this_flow => p_app ,
    p_next_flow_page_sess => p_app||':101');
    end;
    ...and things worked fine.
    hope this helps,
    raj

  • I just got an ipad from a pawnshop.  How do I change the user

    I just got an ipad from a pawnshop.  How do I change the user sign in ... to my email and not the previous owners

    If
    Settings
    General
    erase all content and settings
    doesn't work or requires you to enter the apple ID to wipe the device, take it back to the pawnshop and get your money back.

  • Scheduling Gantt: How to work with the "zoom-to-fit" drop-down

    I'm trying to figure out how to work with the "zoom-to-fit" drop-down on the scheduling Gantt dvt control. It has choices in the drop-down that are not appropriate for my project. The documented purpose of this drop-down is to allow the user to zoom to a level that would allow a certain time range to "fit" within the current window. The choices start at "1 Week" and go up through "2 Weeks", "1 Month" etc. The problem is that the projects I'm displaying are generally just a couple of days long, and consist of many small tasks. So even 1 Week is too big. Also, no matter what I pick in this drop down, nothing happens.
    So my questions are these:
    1. Can I change the choices in this drop-down? If so, how do I do that?
    2. If not, then how can I remove this drop-down? (I figure I probably can if I disable "zoom", but I don't want to do that.)
    3. How do I get this to actually do something? I assume maybe I have to code some listener somewhere, but if so, how do I do that.
    Thanks for any hints, tips and advice!

    Currently, we do not allow customization of zoom-to-fit. Please file an ER. We could add a param to featuresOff attribute to disable/remove zoom-to-fit from the toolbar without disabling/removing zoom.

  • I'm using "window.open()" to show one Calendar in a popup window. I can see that the popup is re-sizable. How can I prevent the user from re-sizing the popup?

    I'm using "window.open()" to show one Calendar in a popup window. I can see that the popup is re-sizable. How can I prevent the user from re-sizing the popup? I have tried "resizable=yes|no|1|0" and that seems to be not working.

    You can't prevent users from resizing a pop-up.
    *https://developer.mozilla.org/en-US/docs/Web/API/window.open

  • How to find out the user-exits?

    hi.
    how to find out the user-exits?
    regards
    eswar.

    Hi,
    *& Report  ZEXITFINDER
    *report  zexitfinder.
    *& Enter the transaction code that you want to search through in order
    *& to find which Standard SAP User Exits exists.
    *& Tables
    tables : tstc, "SAP Transaction Codes
    tadir, "Directory of Repository Objects
    modsapt, "SAP Enhancements - Short Texts
    modact, "Modifications
    trdir, "System table TRDIR
    tfdir, "Function Module
    enlfdir, "Additional Attributes for Function Modules
    tstct. "Transaction Code Texts
    *& Variables
    data : jtab like tadir occurs 0 with header line.
    data : field1(30).
    data : v_devclass like tadir-devclass.
    *& Selection Screen Parameters
    selection-screen begin of block a01 with frame title text-001.
    selection-screen skip.
    parameters : p_tcode like tstc-tcode obligatory.
    selection-screen skip.
    selection-screen end of block a01.
    *& Start of main program
    start-of-selection.
    Validate Transaction Code
    select single * from tstc
    where tcode eq p_tcode.
    Find Repository Objects for transaction code
    if sy-subrc eq 0.
    select single * from tadir
    where pgmid = 'R3TR'
    and object = 'PROG'
    and obj_name = tstc-pgmna.
    move : tadir-devclass to v_devclass.
    if sy-subrc ne 0.
    select single * from trdir
    where name = tstc-pgmna.
    if trdir-subc eq 'F'.
    select single * from tfdir
    where pname = tstc-pgmna.
    select single * from enlfdir
    where funcname = tfdir-funcname.
    select single * from tadir
    where pgmid = 'R3TR'
    and object = 'FUGR'
    and obj_name = enlfdir-area.
    move : tadir-devclass to v_devclass.
    endif.
    endif.
    Find SAP Modifactions
    select * from tadir
    into table jtab
    where pgmid = 'R3TR'
    and object = 'SMOD'
    and devclass = v_devclass.
    select single * from tstct
    where sprsl eq sy-langu
    and tcode eq p_tcode.
    format color col_positive intensified off.
    write:/(19) 'Transaction Code - ',
    20(20) p_tcode,
    45(50) tstct-ttext.
    skip.
    if not jtab[] is initial.
    write:/(95) sy-uline.
    format color col_heading intensified on.
    write:/1 sy-vline,
    2 'Exit Name',
    21 sy-vline ,
    22 'Description',
    95 sy-vline.
    write:/(95) sy-uline.
    loop at jtab.
    select single * from modsapt
    where sprsl = sy-langu and
    name = jtab-obj_name.
    format color col_normal intensified off.
    write:/1 sy-vline,
    2 jtab-obj_name hotspot on,
    21 sy-vline ,
    22 modsapt-modtext,
    95 sy-vline.
    endloop.
    write:/(95) sy-uline.
    describe table jtab.
    skip.
    format color col_total intensified on.
    write:/ 'No of Exits:' , sy-tfill.
    else.
    format color col_negative intensified on.
    write:/(95) 'No User Exit exists'.
    endif.
    else.
    format color col_negative intensified on.
    write:/(95) 'Transaction Code Does Not Exist'.
    endif.
    Take the user to SMOD for the Exit that was selected.
    at line-selection.
    get cursor field field1.
    check field1(4) eq 'JTAB'.
    set parameter id 'MON' field sy-lisel+1(10).
    call transaction 'SMOD' and skip first screen.
    Regards

Maybe you are looking for

  • Why is it so hard to get to green screen in I movie

    The Version in I movie was so much easier than now the steps to advance to green screen ***** HELP HELP HELP thank you do like a video on how to set up to get green screen dont tell me just drag then select green screen there is a STEP before that th

  • Help Problem Automatic TO Creation for GR PO (Mvt. 101)

    Hi Experts, I have a problem creating TO automatically when material is received from PO using movement type 101. The requirement is to receive material from PO with status QI, create and confirm TO automatically into default storage bin. But when ma

  • XML content in MHP-Xlet

    Hello! I am working on a MHP-application that contacts a server and loads an XML-file, but I have problems, sorting and displaying the XML-content in my Xlet. I am using nanoXML to parse the file and via the debug-output of my STB (or the IRT-SW-box)

  • Maintaining Session State

    Hello, Does anyone know how to maintain session and application variables through server restarts? I want to be able to shutdown and startup my Tomcat server without having the users lose their session and application variables (and consequently, the

  • Export project to java source

    When exporting the Toplink project to Java source from the Mapping Workbench, is there a way to tell the workbench to include the package name in the generated file? We do this manually now. Thanks in advance