Effective Data Management Strategies for Posting Payroll Results to Accounting

  • by Kehinde Eseyin, Security Architect
  • November 2, 2009
Learn how you can enhance the performance of posting SAP Payroll results to accounting by optimally managing and controlling the size of tables PPOPX and PPOIX in SAP ERP HCM 6.0.

Following the successful execution of a payroll run, one of the subsequent activities that must be performed is posting payroll results to Financial Accounting and Cost Center Accounting. A productive posting run affects the posting of personnel expenses and payables to accounting. This can affect the size of tables PPOPX and PPOIX because they are updated when the payroll results post. However, if tables PPOPX and PPOIX grow very large, posting can be inhibited and adversely affected by long runtimes or even program termination. Therefore, it is important that you manage these tables’ growth before they get too large. Here are some best practices and approaches on how to control the size of these tables.

You can execute posting runs via program RPCIPE00 or by following menu path Human Resources > Payroll > Subsequent activities > Per payroll period > Posting to Accounting > Execute posting run (Figure 1). You can execute three types of posting runs in the system: a test run, a simulation run, and a productive run. You can simulate a posting run by creating a test run without posting documents and by creating a simulation run with posting documents. The type of posting run performed is controlled by the Type of document creation field in Figure 1. To execute a production run, enter P in the Type of document creation field. Alternatively, to execute a simulation run (with documents) enter S or to execute a test run (without documents), enter T.

Figure 1
Initial selection screen for posting payroll results to accounting


Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.

See more by this author


No comments have been submitted on this article. 

Please log in to post a comment.

To learn more about subscription access to premium content, click here.