| Price Book (tdpcg0611m000)Use this session to view, enter, and
maintain price books. You can start this session from the Price Books (tdpcg0111m000) session or stand-alone. An entity in which you can store price information that is
valid for a given period of time. A price book includes the following elements: - A price book header,
which contains the code, type, and use of the price book.
- One or more price book
lines, which contain the items.
A quantity or value break discount schedule can be linked to
a price book. Specify a name for the price book. Specify whether the price book is a sales price book or a
purchase price book. If this check box is selected, the price book is for
general usage. Note To serve multiple purposes, the price book can also have the Used for Contracts or Used for RFQs check boxes selected. If this check box is selected, the price book can be
allocated to a sales contract or a purchase contract and is usually linked to a contract price revision. If this check box is selected, the price book can be
allocated to a request-for-quotation (RFQ). These price books are used only to store prices, not to
retrieve prices. Note This check box can be selected if the Type field is set to Purchase. The employee ( buyer) assigned the
required permission to access the price book. Based on this, an
employee's authorization level for the price book can be specified. The authorization level can be set to: View Price books can be viewed and printed. Use Price books can be linked. Modify Price books can be created, updated, deleted, and
imported.
Note This field is validated using the authorization and
security process if: The purchase office of
the employee assigned the required permission to access the price book. Based on this, the
employee’s authorization level for the price book can be specified. The authorization level can be set to: View Price books can be viewed and printed. Use Price books can be linked. Modify Price books can be created, updated, deleted, and
imported.
Note This field is validated using the authorization and
security process if: | |