One of the first things you need to do is to set up Base Companies.
Out of several companies, a base company is a company’s ‘own’ company. If this is part of a company group, there might be several base companies.
Base Companies are set up under the Business Partners icon of the desktop. When you create the business partner representing the base company, select the flag Base Company.
For important information about base currencies, refer to Select Base Currency in the System Parameter Maintenance chapter of this guide.
...
This chapter should be used as a kind of tutorial to help you gain familiarity with the procedure required to fully set up a functioning document in SICS.
Setting up documents in SICS is a four-step procedure, and is done once only in a document’s life. The process can be repeated for each document, or several documents can be set up simultaneously.
Below are some points to consider before beginning with the procedure:
...
The SICS access security facility provides the capability to allow or deny users from performing various business functions.
SICS has two main techniques for controlling security: business process security and data-sensitive security.
Business process security answers the general question, “Can the user perform this business function?” It restricts the functions in the program the user can see and execute. Access to business processes is controlled through the combination of user roles, use cases and the identity of the logged-on user.
...
The System Administration desktop in SICS is where the software is customised to individual company needs, and where security measures are set.
System Administration functionality is divided into two sections on the SICS desktop: The System Administration folder, and the System Administration Utility. The System Administration utility does not appear on the user’s desktop. Both sections require passwords to access.
System Administration Utility # Only a user with system administrator rights can access the System Administration Utility.
...
Welcome to DXC SICS version 25.3.
The contents of this guide are based solely on DXC SICS 25.3 and are subject to change in future releases.
System Administration in SICS is intended for the SICS System Administrator, not the end-user, which is why this section is only accessible to those with the correct password.
The System Administration Utility is also part of System Administration, but is not accessible from and end-user’s desktop.
...
DXC reserves the right to alter the product architecture described in this guide for subsequent releases of the DXC SICS product.
Comments, suggestions, problems, or other support-related issues should be submitted in writing to your local DXC SICS sales representative
Security icon
When you double-click the Security icon in the System Administration folder, you see the Access Security Manager window, which allows you to turn security on or off, create users and user roles, and view the system-defined use cases.
Activate/Deactivate Security # At the top of the Access Security Manager window is the Options menu. When you click this menu, you will see the Access Security option. You can select to Activate or Deactivate to turn security on or off for the entire system.
...
Worksheet # The worksheet system parameters determine how the Worksheet Identifiers are allocated and also affect the way worksheets behave.
Select System Administrators from SICS Workstation desktop. Open System Parameter Maintenance. Select the Accounting tab. Select the Worksheet tab. Create New Worksheet Identifier Series # If a Worksheet Identifier Series is not defined for a worksheet type and you want to book on the worksheet type, a new series has to be created.
...
Install BusinessObjects on the server/client.
Business Objects Repository # What is a Repository? # To be able to create a repository you need to create database/database account that BusinessObjects can use when creating the repository.
The person creating the Repository should be the system administrator in the deployment; he should work in co-operation with a DBA or person responsible for the database.
A Repository contains three elements:
A security domain. A universe domain.
...
It is important to make sure that an assumed agreement has sufficient information before it is accepted by all parties. To ensure that the agreement fulfill all criteria, you can register a number of check items. The system may also be set up so that a completed (all items checked) Compliance Check List is required before an assumed agreement can be set to definite. Items to be checked are set up for the entire system and are confirmed on each separate business.
...