Questions about  Invoice against PO

Dear all,
I have a question about Invoice against PO.
The background is:
I have a PO with 1 line items, when I create an invoice via the transaction MIRO, I have to separate the account assignment to different cost object. (e.g. I have separate to three cost objects: Cost Centre A, Cost Centre B and Cost Centre C)
After the invoice is created, I find that in the Purchase Order History tab page, it shows two lines with same invoice number.  (the first line have the amount of the first account assignment, the second line is the sum amount of the remain account assignments)
My question is how to group all account assignment into one lines in the Purchase Order History?
Many thanks
Sunny

For this,
You need to divide the account assignment in PO itself.
Po should contain 3 cost centres and corresponding GL.
For such PO if you make GR, automatically system will allocate material to respective cost elements.
Raghavan

Similar Messages

  • Q: Questions about iExpense / AP invoice apporval / AME. (11.5.9  & 11.5.1)

    Hi, All,
    I have a couple of questions about iExpense / AP invoice apporval / AME.
    (1) In release 11.5.10, If I set profile option [AME: installed] to No,
    Can iExpnese has the same behavior as the previous release?
    I means that I just define the approval limits in signing limits window without defining any conditions and rules in AME when the profile is set to No.
    (2) If user enables AP invoice approval and set the profile option [AME: installed] to Yes at Applicaiton Level (Payables), Regarding iExpense approval limits, we need to define conditions and rules in AME instead of signing limits in AP. Is it right?
    (Release 11.5.9 and Release 11.5.10)
    (3) I found the profile option [ OIE:Enable Approval Management] in Release 11.5.9, but can't find it
    in Release 11.5.10, Is the profile no longer used and replaced by profile [AME:installed]?
    Andy response would be highly appreciated.
    Regards,
    Athena

    1) if you set the profile to NO, that mean you didn`t use the AME. the iEepense used the manager which setup in the employee form .
    2)Yes, I`m sure in 11i10 .
    3) I don`t know.
    :)

  • Legality questions about Home Sharing

    I have some legality questions about Apple's Home Sharing technology.
    As I understand it, you can share (that is, copy it from one computer to another) your music, movies, applications and other iTunes-managed files amongst five computers. The only 'trick' is that each computer must have an iTunes Store account and must be logged in in order for it to work.
    My question concerns the copying aspect and the legality of it. For content that was purchased through the iTunes Store I can see how Home Sharing can provide a limitation on content sharing, since all of the machines would need to be connected to Apple's servers in order for the validation process to happen. But what about content that was added to iTunes through other means, e.g., ripping my own CDs or converting my DVDs? These items can still be copied via Home Sharing and as there's no DRM on them there's no way they can be protected against "illegal" or "unauthorized" use.
    It was my understanding that if I gave a copy of a song to someone else, that's illegal. Apple's Home Sharing technology seems to facilitate this action. If I rip a CD or DVD into iTunes and someone copies it out, isn't that making an illegal copy? Can I be held liable for distribution of content?
    And how far does this extend? If I live in a house with four unrelated people, are they legally (?) allowed to copy music and media amongst each another? Is there a perceived or actual difference between using Home Sharing to copy a movie versus, say, using a USB flash drive? And what if one of them moves out? Am I legally obligated to go through that person's hard drive and remove content that they copied from me before they leave the building?
    Does Home Sharing somehow retroactively change the copyright application on a given CD or DVD? Most of my CDs and DVDs contain notices and warnings against distributing copies. Can these warnings now be ignored, or at least amended with "...unless you're using iTunes Home Sharing" at the ends of them?
    I am not trying to stir up a hornet's nest here. I'm only trying to better understand the legal issues surrounding Home Sharing and particularly how they relate to unprotected content. It seems very contradictory that the RIAA and MPAA would be fighting so hard against peer-to-peer services like BitTorrent and Gnutella while apparently allowing peer-to-peer services through iTunes Home Sharing.
    Furthermore, I also understand that the intention of this system was to allow families who are living together to have common access to all of the "household" music, but my issues aren't about this. I envision, for example, a college dorm building where there's several hundred people living together on the same network subnet, and all of them have Home Sharing enabled and everyone is copying thousands and thousands of songs to/from one another. Is this now legal?
    Any insights would be appreciated. Thanks.

    If I rip a CD or DVD into iTunes and someone copies it out, isn't that making an illegal copy?
    RIPping of commercial, encrypted DVDs (most of them) is illegal to begin with. Or rather, breaking the encryption on a DVD is illegal and in order to RIP the DVD, you must break the encryption. SO you have already "broken the law" by having a copy on your computer.
    Most of my CDs and DVDs contain notices and warnings against distributing copies.
    Most of your DVDs have a notice about even simply making a copy, not only distributing copies.
    Much of your post has been cussed and discussed by many, many people (lawyers, corporations, organizations, individuals, etc.) and no one has come (or likely ever will come) to a complete agreement.
    Generally, "sharing" in the same house hold amongst family members seems to be okay. Outside the same household/family is almost always not okay.
    I envision, for example, a college dorm building where there's several hundred people living together on the same network subnet, and all of them have Home Sharing enabled and everyone is copying thousands and thousands of songs to/from one another. Is this now legal?
    No.
    This is exactly what Napster was and why they were sued & shut down.
    I imagine Apple lawyers have done their homework as well as consulted with the labels to discuss these exact issues.
    And it's called "Home Sharing" to indicate that it is not "Dorm Sharing" or "Workplace Sharing", or even simply "Library Sharing"etc. even though it may be possible to use it in other places than the Home.
    Users on other computers need to know your iTunes ID and password to enable it Home Sharing. Likely this is how Apple got the lables to be okay with it.
    Are you gonna give (and get) dozens/hundreds/thousands/any other users your iTunesID & password?
    You can contact Apple Legal here -> http://www.apple.com/legal

  • Questions about CIN tax procedure choice and pricing schemas

    Hi all,
    I have to implement SAP on a Indian company and I'm verifying all particularity about this country (in particular tax procedures and the great number of differents tax conditions used).
    I have two questions about tax procedures and pricing schemas. Every feedback about thse points will be appreciated.
    a) To choose tax procedure TAXINN or TAXINJ which are the elements that I have to consider?
         I have read lot of documentation about CIN implementation and Iu2019m oriented to choose TAXINN schema, but If possible I  would  to understand better which are on behalf of one choice or another.
    b) To define pricing schemas for India, after check with local users and using examples of documents (in particular tax invoice) actually produced, I have understood that taxes have to be applied on amount defined starting from price list, minus discounts recognized to customer plus surcharges eventually to bill (packing, transport,  etc.).
    Itu2019s correct for any type of taxes that tax amount is calculated on u201Cnet valueu201D defined at item level or there are exceptions to this rule?
    Thanks in advance
    Gianpaolo

    hi,
    this is to inform you that,
    a) About point 1 I know the difference between the 2 tax procedures (conditions or formulas). I also have read in others post in the FORUM that TAXINN is preferable. So I would to understand which are the advantages to choose instead TAXINJ. There are particular reasons or it'a only an alternative customizing setting?
    a.a. for give for posting the link : plese give me the advantages of TAXINJ and TAXINN
    CIN - TAXINN and TAXINJ
    b) About point 2, to define which value has to be used as base amount to calculate taxes isn't a choice, but is defined depending by fiscal requirement of the country, in this case India fiscal requirement. I know that, as Lakshmipathi
    write as answer on my question, exception could be, but it was important for me to understand if I have understood correctly the sequence of the pricing condition in the schema in "normal" situation.
    b.b. you can create your own pricing procedure for this and go ahead.
    hope this clears your issue.
    balajia

  • Questions about Mapping GL Accounts to Group Accounts

    Hi,
    I have some questions about mapping gl accounts to group accounts while configuring OBIEE APPS 7.9.6.3 with EBS R12 as a source:
    FIRST QUESTION.-
    For file file_group_acct_codes_ora.csv, I have the following accounts from my customer:
    101101 - Caja Administrativa
    101102 - Fondo Revolvente
    101103 - Caja de Cambios
    101104 - Efectivo en cajero
    This group of accounts is named CASH, now my customer said that this group begins in 101101 and ends in 101199 but in this moment only have this 4 accounts in GL, the rest of the accounts, I mean 101105-101199 are not used right now, they are gonna used in the future.
    So, my question is, in file_group_acct_codes_ora.csv how I need to put this group:
    In this way:
    CHART OF ACCOUNTS ID,FROM ACCT,TO ACCT,GROUP_ACCT_NUM
    50308,101101,101104,CASH
    Or in this way:
    CHART OF ACCOUNTS ID,FROM ACCT,TO ACCT,GROUP_ACCT_NUM
    50308,101101,101199,CASH
    I mean, is there any problem if I use the second way, or is necessary to do it in the first way, and why?
    SECOND QUESTION.-
    For file file_group_acct_names.csv, when I update with a new group of accounts, is there any rule or size boundary for GROUP_ACCOUNT_NAME?
    THIRD QUESTION.-
    For file_group_acct_names.csv, what is the value in column LANGUAGE? I mean, is EBS language?, DB language?, server language?
    I hope that someone can help me, because I need to clarify this and don't do the first full load and this load ends with error because of this.
    Regards,
    Arnulfo

    I'll take some broad swipes at this and let the smarter people come fill in the details.
    We have a true 1:1 setup in our office and have moved to PHDs as a means of protecting against downtime. The thinking is that we will have a spare machine lying around with our base installation ready to go. If a user's machine fails we'll replace it with the spare machine, let it sync the user directory from the server, and we're back in business. It's no substitute for a real backup system, but it potentially avoids having to run a restore from your backups. It also reduces network traffic compared to plain networked homes, and still lets your users work if the server goes down, but provides the benefits of centralized management. John DeTroye wrote a nice article about this.
    If you've already got data on your "client" Mac you will need to move it onto the server. PHDs will download data from the server to the client on the first sync, but will not upload a complete home directory from the client to an empty directory on the server. You'll find some posts in this forum discussing how people have gone about migrating data prior to that first sync.
    WGM allows you to establish exclusions for stuff you don't want to sync.
    One thing to watch out for in the scenario you describe is the so-called "rabbit effect." Assume Bob uses Mac1 as his primary machine. If one day he logs into Mac2 his home directory will be downloaded to Mac2. Once he returns to Mac1 he'll still be cluttering up Mac2 with his data. If he logs into Mac3 the next day and Tom and Sue are also periodically logging into different machines, you can see how you'll end up with a mess pretty quickly.
    Hope this helps.

  • Question about LRU in a replicated cache

    Hi Tangosol,
    I have a question about how the LRU eviction policy works in a replicated cache that uses a local cache for its backing map. My cache config looks like this:
    <replicated-scheme>
    <scheme-name>local-repl-scheme</scheme-name>
    <backing-map-scheme>
    <local-scheme>
    <scheme-ref>base-local-scheme</scheme-ref>
    </local-scheme>
    </backing-map-scheme>
    </replicated-scheme>
    <local-scheme>
    <scheme-name>base-local-scheme</scheme-name>
    <eviction-policy>LRU</eviction-policy>
    <high-units>50</high-units>
    <low-units>20</low-units>
    <expiry-delay/>
    <flush-delay/>
    </local-scheme>
    My test code does the following:
    1. Inserts 50 entries into the cache
    2. Checks to see that the cache size is 50
    3. Inserts 1 additional entry (as I understand it, this should cause the eviction logic to kick-in)
    4. Checks the cache size again, expecting it to now be 20
    With HYBRID and LFU eviction policies, the above logic works exactly as expected. When I switch to LRU however, the code at step 2 always returns a value significantly less than 50. All 50 inserts appear to complete successfully, so I can only assume that some of the entries have already been evicted by the time I get to step 2.
    Any thoughts?
    Thanks.
    Pete L.
    Addendum:
    As usual, in attempting to boil this issue down to its essential elements, I left out some details that turned out to be important. The logic that causes the condition to occur looks more like:
    1. Loop 2 times:
    2. Create named cache instance "TestReplCache"
    3. Insert 50 cache entries
    4. Verify that cache size == 50
    5. Insert 1 additional entry
    6. Verify that cache size == 20
    7. call cache.release()
    8. End Loop
    With this logic, the problem occurs on the second pass of the loop. Step 4 reports a cache size of < 50. This happens with LRU, LFU, and HYBRID-- so my initial characterization of this problem is incorrect. The salient details appear to be that I am using the same cache name each pass of the loop and that I am calling release() at the end of the loop. (If I call destroy() instead, all works as expected.)
    So... my revised question(s) would be: is this behavior expected? Is calling destroy() my only recourse?
    Message was edited by: planeski

    Robert,
    Attached are my sample code and cache config files. The code is a bit contrived-- it's extracted from a JUnit test case. Typically, we wouldn't re-use the same cache name in this way. What caught my eye however, was the fact that this same test case does not exhibit this behavior when running against a local cache directly (as opposed to a repl cache backed by a local cache.)
    Why call release? Well, again, when running this same test case against a local cache, you have to call release or it won't work. I figured the same applied to a repl cache backed by a local cache.
    Now that I understand this is more a byproduct of how my unit tests are written and not an issue with LRU eviction (as I originally thought), it's not a big deal-- more of a curiosity than a problem.
    Pete L.<br><br> <b> Attachment: </b><br>coherence-cache-config.xml <br> (*To use this attachment you will need to rename 545.bin to coherence-cache-config.xml after the download is complete.)<br><br> <b> Attachment: </b><br>LruTest.java <br> (*To use this attachment you will need to rename 546.bin to LruTest.java after the download is complete.)

  • Question about size of ints in Xcode

    Hello. I have a a few quick questions about declaring and defining variables and about their size and so forth. The book I'm reading at the moment, "Learn C on the Mac", says the following in reference to the difference between declaring and defining a variable:
    A variable declaration is any statement that specifies a variables name and type. The line *int myInt;* certainly does that. A variable definition is a declaration that causes memory to be allocated for the variable. Since the previous statement does cause memory to be allocated for myInt, it does qualify as a definition.
    I always thought a definition of a variable was a statement that assigned a value to a variable. If a basic declaration like "int myInt;" does allocate memory for the variable and therefore is a definition, can anyone give me an example of a declaration that does not allocate memory for the variable and therefore is not a definition?
    The book goes on, a page or so late, to say this:
    Since myInt was declared to be of type int, and since Xcode is currently set to use 4-byte ints, 4 bytes of memory were reserved for myInt. Since we haven't placed a value in those 4 bytes yet, they could contain any value at all. Some compilers place a value of 0 in a newly allocated variable, but others do not. The key is not to depend on a variable being preset to some specific value. If you want a variable to contain a specific value, assign the value to the variable yourself.
    First, I know that an int can be different sizes (either 4 bytes or 8 bytes, I think), but what does this depend on? I thought it depended on the compiler, but the above quote makes it sound like it depends on the IDE, Xcode. Which is it?
    Second, it said that Xcode is currently set to use 4-byte ints. Does this mean that there is a setting that the user can change to make ints a different size (like 8 bytes), or does it mean that the creators of Xcode currently have it set to use 4-byte ints?
    Third, for the part about some compilers giving a newly allocated variable a value of 0, does this apply to Xcode or any of its compilers? I assume not, but I wanted to check.
    Thanks for all the help, and have a great weekend!

    Tron55555 wrote:
    I always thought a definition of a variable was a statement that assigned a value to a variable. If a basic declaration like "int myInt;" does allocate memory for the variable and therefore is a definition, can anyone give me an example of a declaration that does not allocate memory for the variable and therefore is not a definition?
    I always like to think of a "declaration" to be something that makes no changes to the actual code, but just provides visibility so that compilation and/or linking will succeed. The "definition" allocates space.
    You can declare a function to establish it in the namespace for the compiler to find but the linker needs an actual definition somewhere to link against. With a variable, you could also declare a variable as "extern int myvar;". The actual definition "int myvar;" would be somewhere else.
    According to that book, both "extern int myvar;" and "int myvar;" are declarations, but only the latter is a definition. That is a valid way to look at it. Both statements 'delcare' something to the compiler, but on the second one 'define's some actual data.
    First, I know that an int can be different sizes (either 4 bytes or 8 bytes, I think), but what does this depend on? I thought it depended on the compiler, but the above quote makes it sound like it depends on the IDE, Xcode. Which is it?
    An "int" is supposed to be a processor's "native" size and the most efficient data type to use. A compiler may or may not be able to change that, depending on the target and the compiler. If a compiler supports that option and Xcode supports that compiler and that option, then Xcode can control it, via the compiler.
    Second, it said that Xcode is currently set to use 4-byte ints. Does this mean that there is a setting that the user can change to make ints a different size (like 8 bytes), or does it mean that the creators of Xcode currently have it set to use 4-byte ints?
    I think that "setting" is just not specifying any option to explicitly set the size. You can use "-m32" or "-m64" to control this, but I wouldn't recommend it. Let Xcode handle those low-level details.
    Third, for the part about some compilers giving a newly allocated variable a value of 0, does this apply to Xcode or any of its compilers? I assume not, but I wanted to check.
    I don't know for sure. Why would you ask? Are you thinking of including 45 lines of macro declarations 3 levels deep to initialize values based on whether or not a particular compiler/target supports automatic initialization? Xcode current supports GCC 3.3, GCC 4.0, GCC 4.2, LLVM GCC, CLang, and Intel's compiler for building PPC, i386, and x86_64 code in both debug and release, with a large number of optimization options. It doesn't matter what compiler you use or what it's behavior is - initialize your variables in C.

  • Question about delete statement

    I have question about delete statement...
    i am performing some simple delete statement against one table..but its taking so long..How can we check whether particular delete statements actually deleting records or not..?

    Is the associated select-statement returning rows or not?
    If yes -> delete is deleting
    If no -> delete is just using CPU-cycles
    To tune the delete-statement, you have to tune the corresponding select-statement. To tune the select-statement, you want to read the thread When your query takes too long ...

  • Question about autodiscover in case of multiple bound namespace

    Hi Experts,
    I have a question about the autodiscover behaviour. Let's assume we have the below infrastructure:
    SiteA :
    MBX-Server-SiteA : Member of a DAG
    CAS-Server-SiteA : outlook anywhere url = siteA.domain.com
    SiteB :
    MBX-Server-SiteB : Member of a DAG
    CAS-Server-SiteB-1 : outlook anywhere url = siteB-1.domain.com
    CAS-Server-SiteB-2: outlook anywhere url = siteB-2.domain.com
    We have DB-1 and DB-2 that have copies in both MBX servers.
    My question is how does exchange select the access URLs to return in the autodiscover process? I know that it depends on where the mailbox is hosted but can't find details about the process in the technet articles.
    Thanks.

    There's quite a few details that are involved in the Autodiscover process. First of all - probably the most important thing is that there are 2 stages to the whole process.
    In the first stage, the client is simply concerned with getting the address of a CAS server that will help it further. We'll keep things simple and assume your scenario where the client is located inside the network and is domain-joined. The details of the
    LDAP query are detailed in
    this link. (At the time I was investigating this I've actually went ahead and ran the queries using the ldp.exe client against the Configuration partition of the respective AD domain - it's worth seeing the actual responses.) An interesting trick here is
    the 'keywords' attribute that's stamped on those SCP entries. The reason behind it is that you don't want a client located in a site to go half across the globe in order to connect to a CAS server, when there's one available in its own site. One simple way
    to get the 'keywords' attribute stamped is through the Set-ClientAccessServer cmdlet, using the -AutodiscoverSiteScope parameter. In your example, you'd probably want to run it against the CAS server in Site A and specify the name of the corresponding AD site
    ('SiteA') and correspondingly against the 2 CAS servers in Site B (using 'SiteB'). Once the client has got the response to his query, it will attempt to select one server that's handling the site he's in (essentially it will filter the results based on 'keywords'
    -contains <client-site>). Now that we got our endpoint we can go to stage 2.
    In stage 2, the client will actually use EWS in order to query the Autodiscover service itself running on our target server. There are 2 possible interfaces of accessing the Autodiscover service: POX (Plain Old XML) and SOAP. POX will be targeting the ../Autodiscover.xml
    URLS, while the SOAP one will be using ../Autodiscover.svc URLs. Details about this including some hardcoded parts are
    here. What happens next is detailed in point 3, section 2.1 The Autodiscover Process
    here. This last link is the key to the whole process:
    "It provides a list of CAS that has AutodiscoverSiteScope information set for the
    Associated AD site of the Database where the client Mailbox is located."
    In other words, the CAS is smart enough to return the URLs belonging to a CAS server in the AD site where the client's mailbox' database is active.
    My advice is to test this on your scenario. Tests can be done here first-hand: the Outlook's tray icon Test E-Mail AutoConfiguration can be used or alternatively - if you want to see the details in the communication - SoapUI
    for the SOAP access method, for POX there's an extension called 'Postman for Chrome' that can be used. I've used all these in my tests back when I was fighting conflicting results from the articles around the web about Autodiscover.
    That's a long way of saying we get the AutoD URL of a CAS server closest to the workstation, which then provides the configuration to use which are the the URLs closest to the mailbox  :)
    By all means look at the SOAP response, but Outlook will only use POX.  Lync does SOAP along with other 3rd party apps.
    Cheers,
    Rhoderick
    Microsoft Senior Exchange PFE
    Blog:
    http://blogs.technet.com/rmilne 
    Twitter:   LinkedIn:
      Facebook:
      XING:
    Note: Posts are provided “AS IS” without warranty of any kind, either expressed or implied, including but not limited to the implied warranties of merchantability and/or fitness for a particular purpose.

  • Basic questions about JAAS capabilities

    I've never used JAAS for authentication or authorization in a Java app before. Can somebody that has (or at least has some experience and knowledge about JAAS) please answer the following couple of basic questions about it? (I know I could probably answer these myself with a few hours of reading.)
    1. Can I use JAAS to restrict the users that can execute specific methods of my code?
    2. If the answer to #1 is yes, is there a way to programmatically determine if a JAAS login user has the permissions to run a method before actually calling that method. In other words, can I ask something like canUserExecute(method) or do I have to just put the call to the method in a try/catch and catch a security exception of some type?
    3. Is it fairly simple to have JAAS authenticate against a Windows Domain or a LDAP server?
    4. Are there programmatic ways to add or edit user information in JAAS?
    Answer to any of these questions are greatly appreciated. I'll even toss a couple of Dukes to the people that answer each question. Thanks in advance.

    You might look at the AfterthoughtSoft-Secure product at http://www.advancedmodelingconcepts.com. It is designed to do just that and will easily allow you to connect to users/group repositories that are in anything from a simple text file all the way up to Kerberos V.
    You can contact the author of the product (me) at bart dot jenkins at gd-ais dot com.
    bart

  • Basic Questions about PLD

    Hi,
    I have three general questions about using print layouts.
    1) How to select different layouts depending on the business case (not dependent on the BP):
    When I want to print an invoice NOT using the default layout, how can I quickly choose another layout? Just selecting one layout of the list and clicking the Ok button didn't have any effect. Do I first have to change the default layout before I can print the invoice in this other layout???
    2) In our old computer system, we have a lot of terms that can optionally be added to the invoice depending on each business case. I wonder if I have to create different layouts for all the combinations of terms that might occur or if there is any other possibility of working with text modules?
    3) Is it possible to add any sentences manually to the print document without changing the print layout?
    And last but not least, where can I find PLD manuals?
    Thanks a lot in advance!
    Corinna

    Hi,
    1) How to select different layouts depending on the business case (not dependent on the BP):
    Answer : Yes, you do  first have to change the default layout before printing.
    2) In our old computer system, we have a lot of terms that can optionally be added to the invoice depending on each business case. I wonder if I have to create different layouts for all the combinations of terms that might occur or if there is any other possibility of working with text modules?
    Answer: I would think that is the easiest option for PLD.
    Otherwise, if you have Crystal Report and also Crystal Report Add On installed, then you can create your layout in Crystal report.
    Note that if you are using SAP 2007, you can only print them as report, not within the specific screen, example, go to invoice and print the report created.
    However, in SAP 8.8, this facility is available.
    3) Is it possible to add any sentences manually to the print document without changing the print layout?
    Answer, No, not with PLD.
    4) where can I find PLD manuals?
    When you logon on SAP Business one portal, click on "Document Resource Center" and there are heaps of documents there including PLD.
    Edited by: Shwu Hua Gan on Feb 14, 2010 11:03 PM

  • Basic questions about Exchange Rate Differences

    Hi Experts?
    I have few questions about exchange rates:
    1. Currently in 2007, under what circumstances are exchange rate differences not posted automatically? In the previous version, it was this case when invoices are linked to payment, and manual exchage rate differences had to be run.
    2. What are unrealized exchange rates? and When do unrealized exchange rates occurs?
    3. In account oo logical pinciples, why is there a need to auto reverse Exchange rate differences or Conversion rate differences during the opening of a new posting period??
    Much Thanks!
    Warmest Regards,
    Chinho

    Hi Chinho,
    you may find useful info in this wiki:
    [How does SAP Business One deal with Realised and Unrealised Exchange Rate Differences? |https://wiki.sdn.sap.com/wiki/pages/viewpage.action?pageId=60654139]
    & also these 2 EES:
    [Exchange Rate Differences|https://psd.sap-ag.de/PEC/calendar/html/recording.php?hck=7a4f07ef7ac81ec31e04d55faffe33bdde93ec2398c338760e0d98adab7ba5acf2c39b2da1782f45e8a5a4d337dedcc647afebddd531782af42bafae98ce7ed5]
    [Exchange Rate|https://psd.sap-ag.de/PEC/calendar/html/recording.php?hck=e5397f14c44f8df754617194051dab1ad38f59f08580406c2efd59aa4c0f71616713c2abe76bc503e08f2f5eda4863634f6fe99ad39d46c947c09623b91e53ca]
    As a rule, in version 2007 it's the unrealised exchange rate differences on the BP side that are relevant since with the introduction of the unified internal reconciliation engine realised partial exchange rate differences are automatically posted. You also use the functionality to post exchange rate differences for FC GL accounts at a particular execution day.
    All the best,
    Kerstin

  • Basic questions about Ironport

    Dear responder,
    I have some questions about the S series Web Security Ironport, It would be appreciated to respond it one by one.
    1-Is ironport can work independently if i buy it alone and put it on the edge of my network and connect the internet to the one of that ports and connect my local lan switch to the other port?
    2-If i can use it independanly can i use it in the Transparent proxy mode not the explicit one and make it sensitive to the Http traffic to bring the Authentication page for new users who want to connect to the Internet?
    3-Is there any authentication page in ironport or i have connect to the ironport to use Internet like VPN connection by an agent?
    4-Assume that if a user is currently log-in and the user wants to log-out, it there any way to Logout from the Ironport with a specific page for loging-out?
    5-Is there any local database is available into the Ironport to create users?
    6-Is there any option to define radius or Ldap server address as User database to read when needed for authentication propose?
    thank you so much.
    Abraham

    Good Afternoon Abraham,
    In my answers I'll assume you'll get AsyncOS 7.5 for Web for your WSA.
    1.  This is "in-line" mode, and while the documentation doesn't specifically say you can't do this, it doesn't say you can either.  The support on this is fuzzy.   There are 2 supported ways to deploy a WSA: Transparent redirection (using WCCP or policy-based routing), or explicit mode, using settings in the browser, or PAC files.
    2. If I understand your question, the answer is yes.  With transparent redirection, you can force all http traffic to the WSA, and require users to authenticate.  You can force the users to enter a username and password, or it can happen automatically (see answer 3)
    3. There are a few ways to handle authentication for your users: 
         They can authenticate to the the ironport, which can do a lookup against your LDAP or Active Directory.
         It can transparently authenticated them if you're using Active Directory and a browser that supports it (IE, Firefox, Chrome)
         You can use the ADAgent (runs on a seperate box) which scrapes the security logs from the AD domain controllers and passed authenticated users and their IP to the the Ironport.
    4. I'm not aware of a "logout" page.
    5. There is a "local database" for administrative users, and you can use RADIUS for administrative users, but not for your regular users. (see answer 6)
    6. Yes. You can use LDAP, Novell eDirectory, or Microsoft Active Directory for your users.
    I hope that helps!
    Ken

  • Question about the MAKZN field in the RBKP table

    Hello all.
    I have a question about the MAKZN field. Does anyone know what field in MIRO is assigned to this field? We have an issue where a line item amount was not selected invoice was out of balance but the agent selected accept and post. And invoice posted. but I am interested in knowing where the amount if keyed in because when I go to the RBKP table I see an amount entered in the MAKZN (manually accept net difference amount)

    Hi,
    it seems as if the value was calculated internally:
    program SAPLMR1M
    dynpro 6000
    PAI module fcode_6000
    Include LMR1MI3W
    *-------- buchen ------------------------------------------------------*
        WHEN fcobu OR fcomanak.
    *--- identical code in PAI Module FCODE_6250 --------------------------*
          PERFORM ota_check USING vf_kred-xcpdk rbkpv-xcpdd
                            CHANGING rc.
          IF rc NE 0.
            CLEAR ok-code.
            EXIT.
          ENDIF.
          IF ok-code = fcomanak.
            PERFORM diff_akzeptieren.
            ok-code = fcobu.
          ENDIF.
    where:
    fcomanak          LIKE ok-code VALUE 'MANAK', " Manuell akzeptiert
    *&      Form  DIFF_AKZEPTIEREN
    *       Differenz manuell akzeptieren
      FORM diff_akzeptieren.
    *       Manuell akzeptierter Betrag
        rbkpv-makzn  = rbkpv-makzn + rbkpv-diffn.
        rbkpv-makzmw = rbkpv-makzmw + rbkpv-diffmw.
    *       Differenzbeträge
        CLEAR: rbkpv-diffn, rbkpv-diffmw.
      ENDFORM.                             " DIFF_AKZEPTIEREN
    maybe it´s happenning when releasing manually the invoice in MRBR?
    Best regards.

  • Question about repository

    Hi
    I have some questions about repositories and if anyone could answer I´ll be very grateful.
    What does it contains? Data or objects without data?
    How does it works together with a database, I mean, when there is a DML sentence where are those changes apply? In the database, in the repository, both...
    The first time you install a repository how can you insert data on it, I mean do you have to import objects from the schemas, you don´t have to do it if both are in the same database...
    And If any of you knows a good guide or any doc to learn more about the uses of a repository with an oracle database please tell me.
    Thank you very much.
    Gerardo

    Oracle Designer is a CASE tool, that is, a tool for capturing and analysing requirements, designing a system and (optionally) generating it. This is all data, which is stored in the repository. Think of it as any other application.
    Once analyzed, designed and modelled the deployed application will run against some other database not the repository.
    I mean, do I have to do the changes on the database or in the designer toolsAs a DBA I would not expect you normally to touch the repository, except for the usual things (checking tablespace growth, etc). Are you also supposed to be the Repository administrator?
    Anyway, the data model and integrity rules in the respository are very complicated and you do not want to tool around with SQL in the repository; use the Designer tools. Howvever, Oracle do provide a suite of PL/SQL packages - teh Repository API - which do allow us to manipulate the data programmatically. This can be very handy when we need to do reetitive tasks on a large number of elements.
    Cheers, APC

Maybe you are looking for

  • Office Outlook 2013 no search results

    Installation: Server 2008 R2 Terminal server Office Outlook 2013 This is a new server install and happening the same for all 15 users on the server, Admin s and users. I am unable to display any results when searching mail box. I modified and rebuild

  • Session problem in jsp application

    I face a session problem. I setting everything in a session and when pass back to a main page, the value is not display in the screen. But after refresh the value will display in the screen and this kind of problem only come out very few time and i d

  • Concept similar to ServletContext available for WD?

    Hi, in standard J2EE web applications there is the ServletContext (als known as the predefined JSP-variable application) which can hold application specific data that can be accessed by any user session as long as the web application is running. In J

  • Photo Screensaver question

    Hello Does anyone know a photoscreensaver that'll show the path and file names? I used use that option under Windows 2000 many years ago and have been searching in vain for the Mac equivalent. The only one I have come across so far is ArtSaver 1.7, b

  • Frm-10142 error while running form

    hi, I have installed Oracle Database 10g Enterprise Edition Release 10.2.0.1.0 and Oracle Developer Suite 10g (9.0.4) on my windows 7 32bit system.but i couldnot connect from forms to database.so i uninstalled developer suite and installed oracle dvs