Is it possible to use BAPI-ALE to send an idoc using the message control?

Hi Guys
Is it possible to use BAPi-ALE to send an IDOC using a message control?
I have configured the system to send an IDOC when a outbound delivery is saved in the system.
I have done the following.
1). I am using the std BAPI-ALE interface provided by the object type LIKP.
2). I am using the method SAVEREPLICA for which an interface already exists in BDBG transaction.
3). I hace created a distribution model in BD64 and added the BAPI - LIKP and SAVEREPLICA
4). Created a partner profile ( using the generate partner profile option in the BD64 transaction )
QUESTION:
1). How do i associate the custom OUTPUT type created for Delivery ?
2). I tried to associate the custom output type in the Partner profile definition under the message control tab but i am not sure which Process code to be used? Since the partner profile was generated automatically from BD64 it has an entry for SHP_OBDLV_SAVE_REPLICA as a message type in the outbound parameters. and i am unable to find a process code for this Message type in WE41. So what process code should i use in the Message control tab against the custom output type?
3). Do i need to leave the message control tab empty without making any entry? If yes then how would the system come to know that it needs to trigger this partner profile when the custom output type is proposed by the system?
will award points for useful answers
Edited by: Workflow  learner on May 29, 2008 8:49 PM

"any way"
Applications such as ScreenRecycler, http://www.screenrecycler.com/ScreenRecycler.html, can do it.

Similar Messages

  • When i send a text message with my new iphone 5 to my wife who is now using my old Iphone 4 we both receive the message. How is this possible? Also she receives all text messages sent to me

    when i send a text message with my new iphone 5 to my wife who is now using my old Iphone 4 we both receive the message. How is this possible? Also she receives all text messages sent to me. She obviously has a different phone number and a different provider

    See here to create a new apple ID
    http://support.apple.com/kb/HE37
    good luck

  • Is it possible to use the message control in R/3 to trigger a Proxy?

    Is it possible to use the message control in R/3 to trigger a Proxy? The message control mechanism has some advantages that I want to use E.g. repeat messages with RSNAST00, configuration instead of coding etc.. Does anyone uses SD Invoice message control mechanisms together with XI Proxies?
    Best regards,
    Matthias

    Hi,
    >>>configuration instead of coding etc
    currenly it is not possible to achive it without any coding
    >>>repeat messages with RSNAST00
    RSNAST00 is not used to repeat messages (idocs) but to send them
    try using standard IDOC in your sd invoice scenario
    if you don't want to do any coding
    Regards,
    michal

  • HT4623 I still have an iPad 1, and need to update to iOS 7 to use Keynote, Pages and Numbers but I get the message the my system is updated in iOS 5.1.1 and doen's offer me another update!

    I still have an iPad 1, and need to update to iOS 7 to use Keynote, Pages and Numbers but I get the message the my system is updated in iOS 5.1.1 and doent's offer me another update! How can I update it? Or I can't?

    ayrosa wrote:
    I still have an iPad 1, and need to update to iOS 7 
    Sorry... This is not possible. The iPad 1 can Only go as far as iOS 5.1.1

  • On my macbook pro I have a message on my homepage telling me that certain items want to use my keychain. I've pressed cancel the message will not go. The mac is now running very slow and iphoto and safari are not working. Can anyone help?

    On my macbook pro I have a message on my homepage telling me that certain items want to use my keychain. I've pressed cancel the message will not go. The mac is now running very slow and iphoto and safari are not working. Can anyone help?

    What version of Mac OS X?
    What home page?
    What browser?

  • How can I view the content within the message without having to double click on the message. I used to be able to see content of the message alongside it .

    How can I view the content of the message without having to double click on it; I used to be able to see content of the message next to it .

    Is this in Mail?
    You can (I do all the time). The oreview window can be resized by dragging the message list window border - you might accidentally have closed it up

  • Just updated the lion os x, and now when I try to use my optus dongle, it comes up with the message saying that it won't work because Java Runtime needs to be installed.  Help?

    just updated the lion os x, and now when I try to use my optus dongle, it comes up with the message saying that it won't work because Java Runtime needs to be installed.  Help?

    Have you run Software Update.  You have Java already installed, but it needs to be updated.

  • I bught a new Time Capsule 2Tb. I connected it to my internet router. I manege to set it up as base station but when i try to use it with time machine I always get the message "Check your IP addres"? What am I doing wrong? On my computer I have OSX 10.7.5

    I bought a new Time Capsule 2Tb. I connected it to my internet router. I manage to set it up as base station but when i try to use it with time machine I always get the message "Check your IP addres"? What am I doing wrong? On my computer I have OSX 10.7.5

    What IP address does the TC have and what IP does the computer have?
    We need more info as we really have no idea what your network looks like.
    Modem router, model, type of broadband?
    TC setup as bridge or router?
    Is the computer getting internet via the TC?
    Are you using wireless or ethernet?
    Have you set IPv6 correctly to local link in the computer on whichever network client is doing the connection?
    Did this work the first time for backup and has now failed? If so simply reboot the TC. It is a constant bug that the TC is lost to the network.

  • Is it possible that someone could redirect someones  email account, and screen the messages over the internet without their knowledge.

    Is it possible that someone could redirect someones  email account, and screen the messages without their knowledge.

    Call it phishing or not, any website designed to emulate another with the primary goal of obtaining one's personal information through deception is easily accomplished. You called it a façade, which is as good an description as any. It can be performed with most an hour of work, and uploaded to any server willing to host it. They have been known to be attached to legitimate websites, often educational institutions for which security is lax, and in which many people with too much time on their hands have sufficient privileges to modify the site at will.
    Constructing a more elaborate website that faithfully reproduces a secure webmail page populated with functional links would simply take more effort with probably more individuals working on it, but it is by no means beyond the realm of possibility.
    Perhaps the Apple Genius was describing something different, or not, but the point is that it is certainly possible for someone to screen or otherwise view your email messages. It's simple, given just a couple of pieces of your account information. The most common means of obtaining that information is through deception, a low-tech social exploit that has been with us for thousands of years.

  • I've tried to download an app that I used to have but deleted. I get the message "You've already purchased this, so it will be downloaded now at no additional charge." BUT it won't download.

    I've tried to download an app that I used to have but deleted. I get the message "You've already purchased this, so it will be downloaded now at no additional charge." BUT it won't download.

    Are you certain you have enough memory left on your device to accommodate the app? Also, are you certain that an iOS 8-compatible version has been released by the developer? If the answer to both questions is "yes", then try downloading it via an iTunes sync.
    Cheers,
    GB

  • Can BAPI Calls in a report trigger an IDOC using BAPI-ALE?

    Hi,
    I had a requirement to create PO using BAPI. The code is complete. But now I have to use an IDOc instead of BAPI since it is an asynchronous scenario.
    Is there any possible way that after CALL BAPI step in the report, an IDOc will be triggered. Is it possible if i set BAPI-ALE?
    If yes, do we need to call call_bapi_commit.
    Regards,
    Sreehari.

    hi Shree,
    What i understood from u r question is that u need to send teh created PO(created in by bapi ) through IDoc .
    Correct me if i m wrong.
       you can trigger IDoc from report program easily . I think u have to use  bapi _transaction _commit  to commit and then trigger IDoc .
    And also check the possiblity of change pointer as they r for the same.

  • What is the use of ALE and EDI in IDOC process

    hi gurus,
    in which scenario we use ALE/EDI?
    actually IDOC stands for Intermediate document which stores the data and sendng outbound and receiving inbound.
    i am not understanding onething here what is the necessity to use ALE/EDI?
    could you please tell me?
    Regards,
    SOMIU.

    Hi Somu,
    Purpose
    Electronic Data Interchange (EDI) and Application Link Enabling (ALE) are used for exchanging business data between different systems.
    For both these forms of communication, you require the IDoc Interface. The IDoc interface is made up of the definition of a data structure and the processing logic of this data structure. The data structure is the IDoc. The IDoc is the general exchange format of the communicating systems. IDocs can be sent using different methods (for example, Structure linkRFC or as a file).
    Application Link Enabling (ALE)
    You distribute data using ALE if you want to communicate from one system to one or more other (mostly internal) systems. ALE transfers data in IDoc format and uses the methods of tRFC for data transfer.
    ·       ALE enables the integration of business processes across several SAP or non-SAP systems.
    Electronic Data Interchange (EDI)
    You use EDI if you want to exchange business application documents with an (external) partner system (for example, a customer or vendor). The SAP system sends EDI messages in IDoc format to an EDI subsystem, where they are converted to a universal EDI standard (UN/EDIFACT or ANSI/X12). This enables communication with non-SAP systems.
    ·       By definition, two partners are involved in the process in an EDI application scenario: The sender and the recipient of an EDI message. 
    Thanks&Regards,
    Phani.
    Points if Helpful.

  • ALE Configuration for PEXR2002 IDoc  and PAYEXT message type sending to XI

    Hi all,
              I need ALE Configuration for PEXR2002(Basic Type) IDoc , it's message type PAYEXT.
    I don't know ALE Configuration for sending data from SAP IDS to SAP XI.????
    I need ALE Configuration doc/pdf??
    Please give me some guidline for this..
    Regards,
    Umesh

    Umesh,
    I was wondering if you have had any luck creating the configuration for PEXR2002 Idoc, PAYEXT message types, and sending the result set to XI. 
    I need to perform the same task within our R3 environment using the FTP protocol in XI to send the file to the Bank to be processed.
    Any help or direction would be great.
    Thanks,
    Dave

  • HT4972 I replaced the computer I originally used to synch my iPhone. I get the message stating that my content will be erased, even though this is the computer I now synch with. Is there a way to make the update recognize the new computer?

    I replaced the computer I originally used to synch my iPhone. When trying to update to iOS5.0, I get the message stating that my content will be erased, even though this is the computer I now synch my phone with. Is there a way to make the update recognize the new computer so that my content will be kept?

    The best option is to copy your entire iTunes folder from your old computer to your new one using one of the methods described here: http://support.apple.com/kb/HT4527.  This will allow iTunes on your new computer to recognize and sync with your phone without deleting content.  You will also need to copy over any other synced data not in your iTunes library such as photos synced to your phone, calendars and contacts.
    If you can't do this, these articles will help you start syncing with your new computer with minimal or no data loss:
    Syncing to a "New" Computer or replacing a "crashed" Hard Drive
    Recovering your iTunes library from your iPod or iOS device

  • At 3AM, within seconds, there were two attempts at using an "incorrect password" with my AppleID. The message from Apple was that it was probably a harmeless error. Seconds later, the third attempt worked, and that was the last my email has worked.Next???

    At 3AM, there was one attempt at entering my AppleID password, which failed per the email message. A few seconds later, a second attempt failed and the email message from Apple was that it was probably a mistake caused by someone entering a wrong keystroke when trying to enter their own password. Well,, a few seconds later, the message was that I had successfully changed my password. Great.
    Yes, it was a full twelve hours later that I saw this, since 3AM is a perfect time to hijack anyone, and I did do what it said about changing my password. But I want to know how someone changed my password at 3AM and had total access to my whole computer. My security is the highest Apple has.
    Mostly, that was the LAST email I've gotten. I can't bring email online. I can't do anything.
    I am mostly computer ignorant, which is why my daughter made me get an Apple in the first place. I love Apple. Any ideas at all the damage done? This seems like a big hole in Apple email. I am absolutely sure no one knew the password because I used a sequence I have never told anyone. Even my ex-husband of 35 years would have no clue.
    Did someone have to know that password? Is there another way? Well, I guess so.
    Help. Those emails are critical.

    Well if someone got access to your AppleID, they didn't get access to your computer, however, there is some information such as you iCloud information that they may have gotten access to.  If you changed your pasword back to something else, then they won't have access to it anymore either.  I'm not sure what is going on though because I have been getting a lot of those emails on my work AppleID that I have to have for work because I need to keep their phone seperate from all of my personal equipment.  It's just strange though that in the past few days I've been getting like 5 or 6 of those emails stating that an attempt was made to change my pasword a day.

Maybe you are looking for

  • Flash video encoder slow

    I'm trying to convert a 4.5 minute *.avi to *.flv and am having some difficulty. Flash Video Encoder says I have about 15.5 hours remaining (am 0.5 hours into the process). That seems wholly unreasonable given the fact that it took me all of maybe 5

  • Profile File Invalid" and can't upload to Youtube form Elements v.4- ????

    Problem with Adobe Premiere elements v.4 running on vista. When I try to upload directly to youtube I get a message" ! Profile File Invalid" and can't upload. I have to save the file to PC then upload. Can you help?

  • Printer not compatible with OS X Tiger 10.4? Help!

    Hi there, A few months ago I bought a Konica Minolta Magicolour 2400W laser printer (in a panic, was the cheapest available - in order to print my thesis). I have since bought an Apple Mac ibookG4 running OS X Tiger 10.4. Konica Minolta tell me that

  • Alignment of user interfaces

    Hi.. I want to know how to  arrange userinterface controls in a lay out.. ie how to move layouts to right,left, top, bottom, center.... and in a perticuler layout how to arrange the controls ie to left, to right, to center, to top, to botom...

  • How do I add folders to mail in iCloud?

    I press the add icon but it doesn't owrk.