Show TOC

Function documentationSolution Maintenance

 

Solutions can be described using, for example, free-text descriptions, customized attributes (like solution type/subtype, tasks), and other information (like attachments). Users later conduct searches based on this information, so when you maintain solutions, it is best to describe them as fully as possible. See also Problem and Solution Search.

You can create, change, and display solutions. You cannot delete them.

Prerequisites

See Solution Database.

Activities

Creating a Solution

  1. Access solution maintenance (see Solution Database).

  2. Choose Create.

    (SAP GUI only) You can also define a solution using a reference. For example, if the solution you want to define is similar to an existing solution, you can copy the existing solution's data and change it as required. You do this using the Create From field.

  3. Choose a solution type from the possible entries and press Enter.

    A solution number is assigned automatically. Depending on how the solution type is configured in Customizing for the Solution Database(SDB), other fields are filled automatically.

    The (short) description is created automatically from the first 40 characters of the long text.

  4. Enter your data as required. See also:

  5. When you are ready, release the solution.

    For solutions to be returned in searches, the solutions must be compiled (see Knowledge Base Compilation). If you compile the Solution Database, and subsequently change the solution, you must recompile the Solution Database, otherwise your changes are not found in searches. For this reason, we recommend regular automatic delta compilation.

    After compilation, when a knowledge administrator searches the Solution Database from within the Solution Database, both released and unreleased solutions are returned. When a user searches the Solution Database from other applications (see Solution Database Start of the navigation path Integration End of the navigation path), the information security profile assigned to the user determines which problems and linked solutions are returned. For more information, see Assigning Information Security Profiles to Users.

  6. Save your data.