Documentation

Personal data: list, content and location

The standard data types associated with personal data main records:

Data type

Description

AIN

Contact (relationship)

AUS

User

BID

Bank account number

BPA

Address

BPC

Customer

BPR

Business partner

BPS

Supplier

BPT

Carrier

COR

Outlook contact

E164TEL, TEL, TELTC

Phone numbers/fax numbers

FNA

First name

GAC

Account (general or individual)

LDS

Lead

MAI

Email address

NAM

Names

REP

Sales representative

 

The detail of the personal data looks as follows:

Results in versions V11.0.8 and GX V11.0.6 could be different depending on the version you run and does not include additional fields you could have created for your own use.

Table

Description

Description

Field

BAPPOINT

Appointment

BP

APTCMP

Contact to visit

APTCCNNUM

Outlook contact 

APTCOR

Sales rep

APTREPNUM

Recording

APTRECADD

Telephone

APTTEL

Mobile phone

APTMOB

Email address

APTEML

Organizer

ATPREPMNA

BID

Bank details

Entity

BPANUM

Bank account number

BIDNUM

BILLLADH

Bill of lading header

BP

BPR

Ship-to customer

BPRNAM

Carrier

BPTNUM

BP1096PRN

1096 print table

Telephone

TEL

Fax

FAX

BP1099BEGBAL

1099 beginning balance

Supplier

BPSNUM

BP1099PRN

1099 print table

Supplier

BPSNUM

Telephone

TEL

BPADDRESS

Addresses

Entity

BPANUM

By default

BPABID

Telephone

TEL

Fax

FAX

Mobile phone

MOB

Internet address

WEB

BPARTNER

Business partner

BP

BPRNUM

Company name

BPRNAM

Default contact

CNTNAM

Default bank account number

BIDNUM

Partner

CSLBPR

BPCARRIER

Carriers

Carrier

BPTNUM

Company name

BPTNAM

Default contact

CNTNAM

BPCCATEG

Customer category

Sales rep

REP

Sales rep

REPDLV

Carrier

BPTNUM

BPCUSTMVT

Customer transactions

Customer

BPCNUM

Risk BP

BPCRSK

BPCUSTOMER

Customers

Customer

BPCNUM

Company name

BPCNAM

Bill-to customer

BPCINV

Pay-by customer

BPCPYR

Group customer

BPCGRU

Risk customer

BPCRSK

Default contact

CNTNAM

Sales rep

REP

Insurance company

BPCCDTISR

Contact

CNTEFAT

BPDLVCUST

Ship-to customer

Customer

BPCNUM

Company name

BPDNAM

Carrier

BPTNUM

Freight agent

FFWNUM

Sales rep

REP

BPEXCEPT

BP-Company exception

BP

BPRNUM

BPMISC

Order-giver/miscellaneous BP

BP code

BPRNUM

BPS1099GEN

1099 generation

Supplier

BPSNUM

BPS1099MNT

Supplier 1099 maintenance

Supplier

BPSNUM

BPS1099PAY

Supplier 1099 payments

Supplier

BPSNUM

BPSCATEG

Supplier category

Carrier

BPTNUM

Freight agent

FFWNUM

BPSHISUPLN

Ship-to addresses

Supplier

BPSNUM

Shipping supp.

BPSSHI

BPSHISUPP

Shipping site suppliers

Shipping supp.

BPSSHI

Company name

BPSNAM

Freight agent

FFWNUM

BPSUPPLIER

Suppliers

Supplier

BPSNUM

Company name

BPSNAM

Pay-to

BPRPAY

Supplier invoice

BPSINV

Supplier group

BPSGRU

Risk BP

BPSRSK

Carrier

BPTNUM

Default contact

CNTNAM

BPSUPPMVT

Supplier transactions

Supplier

BPSNUM

Risk BP

BPSRSK

BSIDUD

Open items

Bill-to/Order BP

BPR

Pay-by

BPRPAY

BSIIMPPAR

Bank import settings

Account

ACCSUSPENSE

From BP

BPRSTR

To BP

BPREND

CALLATTEMP

Call attempt

Company

CTTCMP

Contact (relationship)

CTTCCN

Sales rep

CTTREP

CARAREA

Carrier regions

Carrier

BPTNUM

CARPRICE

Carrier price lists

Carrier

BPTNUM

CASHPAYSPA

Cash payments

BP code

BPRNUM

CBNDET

MRP detail

Source BP

BPRNUM

CCMCRORIGC

Customer originators

Customer

BPCNUM

Contact

CUSTCONTACT

CCMCRORIGE

External originators

Contact

EXTCONTACT

CCMCRORIGS

Supplier originators

Supplier

BPSNUM

Contact

SUPPCONTACT

CCMIMPMFGD

Impact analysis-Work orders

Ship-to customer

BPCNUM

CCMIMPPOD

Impact analysis-Purchases

Supplier

BPSNUM

CCMIMPPRD

Impact analysis-Purchase req

Supplier

BPSNUM

CCMIMPSCD

Impact analysis-Subcontract

Supplier

BPRNUM

CCMIMPSOD

Impact analysis-Sales orders

Sold-to

BPCORD

CCMIMPSQD

Impact analysis-Sales quotes

Sold-to

BPCORD

CFGHISHEA

Configuration history header

BP

CFGBPRNUM

CFGMEMO

Configurator memo

BP

CFGBPRNUM

CFODUDDATE

Cash forecast management

Bill-to/Order BP

BPR

Pay-by

BPRPAY

CFOMANMVT

Cash forecast movements

BP

BPRNUM

COMPANY

Company

Company name

CPYNAM

Contact

CNTNAM

Bank account number

BIDNUM

Tax center

GERTAXCEN

COMREP

Sales rep commissions

Sales rep

REP

CONCESSION

Concession

Grantor

CCNUSR

CONTACT

Contacts

Entity

BPANUM

Contact code

CCNCRM

Telephone

TEL

Fax

FAX

Email

WEB

Mobile phone

MOB

CONTACTCRM

Contact relationships

Code

CNTNUM

Last name

CNTLNA

Telephone

CNTETS

Fax

CNTFAX

Mobile phone

CNTMOB

Email

CNTEMA

CONTAINER

Container

Supplier

BPSNUM

CONTCOV

Service contracts coverage

Customer

BPC

CONTSERV

Service contract

Sold-to

CONBPC

Bill-to customer

CONBPCINV

Pay-by

CONBPCPYR

Group customer

CONBPCGRU

Contact (relationship)

CONCCN

Sales rep

SALREP

CONTSERVX

Sold-to

CONBPC

Bill-to customer

CONBPCINV

Pay-by

CONBPCPYR

Group customer

CONBPCGRU

Contact (relationship)

CONCCN

Sales rep

SALREP

CORREP

Representative in charge

Sales rep code

COPREP

CORRESPOND

Outlook contact 

Last name

LNA

First name

FNA

Email

HOMEML

Telephone

HOMTEL

Fax

HOMFAX

Mobile phone

HOMMOB

Code

CNTNUM

BP

BPRNUM

Email

CPYEML

Telephone

CPYTEL

Fax

CPYFAX

Mobile phone

CPYMOB

CRMCLOB

CRM text file

Contact (rel.) code

CRCAINNUM

BP code

CRCBPRNUM

Sales rep

CRCREP

CUNSESSION

Stock count session

From BP

BPRNUMSTR

To BP

BPRNUMEND

DADFCY

DAS2 site

Telephone

TEL

Email address

EMAIL

DATEVBPACC

DATEV BP assignment

BP code

BPRNUM

DCLCUSVATBE

Annual customer listing

BP

BPR

Company name

BPRNAM

Telephone

TEL

DCLCUSVATBED

BP

BPR

Company name

BPRNAM

DCLEECVATBE

EU VAT statement (header)

BP

BPR

Company name

BPRNAM

DCLEECVATBED

EU VAT statement (detail)

BP

BPR

DCLVATPORB

VAT base information

BP

BPRNUM

DCLVATPORL

VAT declaration lines

BP code

BPRNUM

DCLVATSPA

Tax working table (SPA)

BP code

BPRNUM

Company name

BPRNAM

DEB

EU exchange declaration

BP

BPRNUM

DMWBPREXC

Waste disposal exceptions

Business partner

BPR

DMWSCHEME

Waste disposal scheme

Business partner

BPR

DMWWEIGHT

Waste disposal weight

BP

BPR

DOOBPCINT

Internal customers

Customer code

BPCNUM

Customer

BPCNAM

DOOBPCLNK

Order-giver association

Service caller

DOONUM

Order-placer name

DOONAM

Customer

BPCNUM

Customer name

BPCNAM

DUDLNK

Open item links

BP

BPR

EDIBPRCPY

EDI flows by BP/company

BP

BPRNUM

EDIBPRCPYD

BP

BPRNUM

EDIBPRPAR

EDI partners by BP

BP

BPANUM

EDITRKDOC

Documents

BP

BPRNUM

EFASISS

Evt - asset disposal

Buyer

BUY

ELEAACTU

Evt - contract actualization

Lessor

LES

ELEACRT

Evt - contract creation

Lessor

LES

ELEAEND

Evt - end of contract

Lessor

LES

ELEAPAY

Evt - contract fee

Lessor

LES

ELEARPU

Evt - purchase option exercise

Lessor

LES

ELEATRM

Evt - contract termination

Lessor

LES

ENVELOPPE

Envelope

BP

BPRFIN

EVCRESULT

EU VAT ID check result

BP number

BPR

BP name

BPRNAM

FACILITY

Sites

Name

FCYNAM

Bank account number

BIDNUM

Contact

CNTNAM

FAMPB

Skill group

Customer

PBLBPC

FAMPBREP

Qualified employees

Sales rep name

REPNAM

FUP

Reminders conducted

BP

BPRFUP

GACCDUDATE

Open items

Bill-to/Order BP

BPR

Pay-by

BPRPAY

GCOMMIT

Commitments

BP

BPR

GSTDTL

GST detail

BP

BPR

HISTODUD

Open item archive

Bill-to/Order BP

BPR

Pay-by

BPRPAY

HISTOOMM

Mailing history

BP code

BPRNUM

Contact (rel.) code

CCNNUM

HONPRV

Service suppliers

Telephone

TEL

Fax

FAX

INTERVEN

Service response

Customer

BPC

Contact (relationship)

CCN

Subcontractor

SCONUM

Telephone

TEL

Mobile phone

MOB

Email address

EML

ITMBPC

Customer product

Customer

BPCNUM

ITMBPS

Supplier product

Supplier

BPSNUM

ITMMASTER

Products

BP

CFGBPRNUM

LASTCUSMVT

Last customer movements

BP of movement

BPCNUM

LASTSUPMVT

Last supplier movements

BP of movement

BPSNUM

LEAD

Leads

Code

PSTNUM

Supervisor

PSTREP

Company name

CPYNAM

LEASE

Lease contracts

Lessor

LES

MACHINES

Installed base

End user

MACCUTBPC

BP code

BPCNUM

Contact (rel.) code

CCNNUM

Reseller

MACRSL

MACITN

Machine installations

End user

BPC

Reseller

RSL

MANDATE

Mandates

Customer code

BPCNUM

Bank account number

BIDNUM

MARASSREP

Representative portfolio

Sales rep

REPNUM

MARREPSEC

Allocation of sectors

Sales rep

SCTREPSEC

MARSCT

Market sectors

Sales rep

MARSCTREP

 

 

BP

BPR

MFGITM

Work orders - products

Destination

BPCNUM

MFGOPE

Work order - operations

BP

BPRNUM

MFGOPETRK

Manufacture tracking - operati

Supplier

BPSNUM

NOTE

Notes

Customer

BPCNUM

Supplier

BPSNUM

OPERATIONS

Load in progress 

Supplier

BPSNUM

OPPOR

Project

Sales rep

OPPREP

BP

OPPCMP

Contact (relationship)

OPPMCN

ORDCOMP

Service caller

BP code

BPRNUM

ORDCOV

WIP consideration history

BP

BPRNUM

ORDERS

WIP

BP

BPRNUM

PAYVAT

Cash VAT (Portugal)

BP

BPRNUM

PBDGEND

Payment balance decl details

BP

BPR

PDPDET

MPS calculation detail

Source BP

BPRNUM

PHONECALL

Call

BP

CLLCMP

Contact (relationship)

CLLCCN

Outlook contact 

CLLCOR

Direct line

CLLETS

Mobile phone

CLLMOB

Sales rep

CLLREP

Email

CLLEML

PHYELT

Physical assets

Supplier

BPS

PINVOICE

Purchase invoices

BP

BPR

Pay-by

BPRPAY

Company name

BPRNAM

Company name

BPYNAM

Freight agent

FFWNUM

SCD BP code

SPACUSBPR

Bank account number

BVRBID

PINVOICED

Purchase invoice detail

BP

BPR

Supplier

BPSNUM

PINVOICEV

Costing purchase invoices

BP

BPR

Bill-to customer

BPCINV

PITCOUNT

Point counter

Customer

BPC

PITDEB

Points debit

Customer

BPR

PITDEBD

Point debits (line)

Customer

BPR

PIWRK

Temporary journal traceability

BP

BPRNUM

Sales rep 1

REP1

Sales rep 2

REP2

PJMSOLITMD

Sold product list

Customer

CUSTOMER

PJMSOLITMH

Sold product management

Sold-to

BPCORD

Bill-to customer

BPCINV

Pay-by

BPCPYR

PJMTSKOPE

Tasks - Operations

BP

BPRNUM

PLMPAR

PLM setup

Email address

ADDEML1

Email address

ADDEML2

PORDER

POs

Supplier

BPSNUM

Company name

BPRNAM

Company name

BPONAM

Carrier

BPTNUM

Pay-to

BPRPAY

Invoicing BP

BPSINV

Freight agent

FFWNUM

Sold-to

BPCORD

PORDERC

Cumulative POs before returns

Supplier

BPSNUM

Freight agent

FFWNUM2

PORDERQ

POs quantities

Supplier

BPSNUM

Invoicing BP

BPSINV

PORDITM

Purchase orders by product

Supplier

BPSNUM

PPRICLINK

Purchase price list search (link)

Supplier

BPSNUM

Carrier

BPTNUM

PPRIVARWRK

Purchase price variance report

Supplier

BPSNUM

Company name

BPSNAM

PQUOTATF

RFQ supplier detail

Supplier

BPSNUM

Company name

BPRNAM

PRECEIPT

Receipt

Supplier

BPSNUM

Company name

BPONAM

Billed-by supplier

BPSINV

Pay-to

BPRPAY

Carrier

BPTNUM

Freight agent

FFWNUM

PRECEIPTD

Detail receipts

Supplier

BPSNUM

Billed-by supplier

BPSINV

PREQUISD

Purchase request detail

Supplier

BPSNUM

PRESP

RFQ responses

Supplier

BPSNUM

PRESPD

Detail RFQ responses

Supplier

BPSNUM

PRETURN

Returns

Supplier

BPSNUM

Company name

BPRNAM

Invoicing BP

BPSINV

Pay-to

BPRPAY

Carrier

BPTNUM

Freight agent

FFWNUM

PRETURND

Detail return

Supplier

BPSNUM

Invoicing BP

BPSINV

PROJET

Project 

BP

BPRFIN

PWRKPND

Return line detail temporary

Supplier

BPSNUM

Invoicing BP

BPSINV

PWRKPNH

Temporary return

Supplier

BPSNUM

Company name

BPRNAM

Billed-by supplier

BPSINV

Pay-to

BPRPAY

Carrier

BPTNUM

Freight agent

FFWNUM

PWRKPOC

Temporary product-contract

Freight agent

FFWNUM2

PWRKPQF

RFQ ADR supplier temporary

Supplier

BPSNUM

Company name

BPRNAM

PWRKPTH

Temporary receipt

Supplier

BPSNUM

Billed-by supplier

BPSINV

Pay-to

BPRPAY

Carrier

BPTNUM

Freight agent

FFWNUM

RBKBELDET

Belgian bank statement detail

BP code

BPRNUM

Company name

BPRNAM

Bank account

ACCBAN

Temporary account

ACCTMP

RBKBELHEA

Belgian bank statement

Recipient name

DESTNAM

Bank account number

BIDNUMBAN

Account holder name

ACCNAM

Account description

ACCDES

RELMT940D

File FMT940 (lines)

Bank account number

BIDNUM

BP

BPRPAY

Bill-to BP

BPRINV

REPSEC

Secondary marketing contacts

Customer code

BPCNUM

Sales rep code

REPNUM

RESRES

Resource reservations

Reserved by

RERREP

RITENZIONE

Table of retention codes

Cash account

ACC1

Charge account

ACC2

RITMVT

Retention movements

BP

BPR

RNWPREP

Renewal

Grantor

CCNUSR

ROUOPE

Routing - operations

BP

BPRNUM

ROUOPESTD

Standard operations

BP

BPRNUM

RSLINESGER2

Recapitulative statement

Offset

OFFACC

SALESREP

Sales rep

Sales rep

REPNUM

Last name

REPNAM

SBGEO

Consulting fields of service suppliers

Service supplier code

BPRNUM

SBODLINK

Component qty. calculation (link)

Sold-to

BPCORD

Bill-to customer

BPCINV

Group customer

BPCGRU

Pay-by

BPCPYR

Carrier

BPTNUM

SBPBL

Service suppliers' skills

Service supplier code

BPRNUM

SCHGH

Stock change header

Subcontractor

BPSNUM

Customer

BPCNUM

SCOHEAD

Subcontract order

Supplier

BPRNUM

SCOITM

Supplier

BPRNUM

SCOSRV

Order sub-contract services

Supplier

BPRNUM

SCOTRK

Sub-contract tracking

Supplier

BPRNUM

SDELIVERY

Delivery header

Sold-to

BPCORD

Bill-to customer

BPCINV

Pay-by

BPCPYR

Group customer

BPCGRU

Ship-to customer name

BPDNAM

Delivery contact

CNDNAM

Bill-to customer name

BPINAM

Invoice contact

CNINAM

Sales rep

REP

Carrier

BPTNUM

Freight agent

FFWNUM

SDELIVERYD

Delivery detail

Sold-to

BPCORD

Sales rep 1

REP1

Sales rep 2

REP2

SEARESULT

Search result

Record code

OBJNUM

SEAUTH

Credit card authorizations

Customer

BPCNUM

SEBPC

Payment gateway customer data

Customer

BPCNUM

Name

ACCNAM

Email address

EMAIL

SECPST

Lead sector

Sales rep

SPTREP

SELCMGLIS

Marketing selection guide

BP code

BPRNUM

Sales rep code

REPNUM

SERREQUEST

Service requests

Service caller

SREDOO

Customer

SREBPC

Contact (relationship)

SRECCN

Bill-to customer

SREBPCINV

Pay-by

SREBPCPYR

Group customer

SREBPCGRU

Sales rep

SREREP

SETXN

Credit card transactions

Name

ACCNAM

Email address

EMAIL

Customer

BPCNUM

SHIPDOC

Shipment documents

BPs

SDBP

SHIPMENT

Shipment

BP code

BPRNUM

Supplier

BPSNUM

Carrier

BPTNUM

SINVOICE

Sales invoices

BP

BPR

Pay-by

BPRPAY

Company name

BPYNAM

Company name

BPRNAM

SINVOICED

Sales invoice detail

Bill-to customer

BPCINV

Sales rep 1

REP1

Sales rep 2

REP2

SINVOICEV

Costing sales invoice

Bill-to customer

BPCINV

Sold-to

BPCORD

Group customer

BPCGRU

Bill-to customer name

BPINAM

Invoice contact

CNINAM

Ship-to customer name

BPDNAM

Delivery contact

CNDNAM

Pay-by

BPRPAY

Sales rep

REP

Freight agent

FFWNUM

SOI

Statement creation

BP

BPR

SORDER

Sales orders - header

Sold-to

BPCORD

Bill-to customer

BPCINV

Pay-by

BPCPYR

Group customer

BPCGRU

Sold-to customer name

BPCNAM

Person to contact

CNTNAM

Bill-to customer name

BPINAM

Invoice contact

CNINAM

Ship-to customer name

BPDNAM

Delivery contact

CNDNAM

Sales rep

REP

Carrier

BPTNUM

Freight agent

FFWNUM

SORDERC

Sales orders - early/late

Sold-to

BPCORD

Freight agent

FFWNUM

SORDERP

Sales orders - price

Sold-to

BPCORD

Delivery contact

CNDNAM

Bill-to customer

BPCINV

Sales rep 1

REP1

Sales rep 2

REP2

SORDERQ

Sales orders - quantities

Sold-to

BPCORD

Carrier

BPTNUM

SPACK

Delivery package

Sold-to

BPCORD

SPPRTCONF

Price catalog definition

From customer

BPCSTR

To customer

BPCEND

SPRICLINK

Sales price list search

Bill-to customer

BPCINV

Group customer

BPCGRU

Carrier

BPTNUM

SPRICPRTQ

Sales price catalog

Sold-to

BPCORD

SQUOTE

Quote header

Customer

BPCORD

Customer name

BPCNAM

Order contact

CNCNAM

Ship-to customer name

BPDNAM

Delivery contact

CNDNAM

Sales rep

REP

Freight agent

FFWNUM

SQUOTED

Quote detail

Sold-to

BPCORD

Sales rep 1

REP1

Sales rep 2

REP2

Delivery contact

CNDNAM

SRETURN

Sales return header

Sold-to

BPCORD

Ship-to customer name

BPDNAM

Delivery contact

CNDNAM

Bill-to customer

BPCINV

Freight agent

FFWNUM

STOALL

Allocations

BP

BPRNUM

STOJOU

Stock journal

BP

BPRNUM

STOLOT

Lot numbers

Supplier

BPSNUM

STOPREH

Pick ticket header

Sold-to

BPCORD

Carrier

BPTNUM

STOPRELIS

Shipment preparation list

Sold-to

BPCORD

Carrier

BPTNUM

STOPRELISW

Work preparation lists

Sold-to

BPCORD

Carrier

BPTNUM

STOPREW

Work preparation sheet

Sold-to

BPCORD

Bill-to customer

BPCINV

Carrier

BPTNUM

STOQUAL

Quality control

BP

BPRNUM

STOREO

Reorder

BP

BPRNUM

STOSER

Serial numbers

Customer

BPCNUM

STOSRG

Storage

BP

BPRNUM

STOSYNW

Stock resynch work

BP

BPRNUM

STOTRK

Traceability

BP

BPRNUM

SUBCONT

Service supplier

BP code

BPRNUM

SVCRINVCND

Scheduled invoice

Sold-to

BPCORD

Bill-to customer

BPCINV

SWIIMPBVR

Import Swiss ISR file

Business partner

BPR

SWIIMPTMP

Import Swiss ISR file (temp.)

Business partner

BPR

SWRKDLV

Automatic delivery generation

Sold-to

BPCORD

Bill-to customer

BPCINV

TABACCINT

Intercompany account mapping

Source debit

ACCSRCDEB

Source credit

ACCSRCCDT

Target debit

ACCTGRDEB

Target credit

ACCTGRCDT

Source BP

BPRSRC

Target BP

BPRTGR

TABPLACE

Transit area

Supplier

BPSNUM

TABPLACETIME

Transport lead time

Carrier

BPTNUM

TABVATEXE

Tax exemption table

Customer

BPCNUM

TASK

Task

BP

TSKCMP

Contact (relationship)

TSKCCN

Outlook contact 

TSKCOR

Sales rep

TSKREP

TAUTILIS

SAFE X3 WAS users

BP

BPRNUM

E-mail

MAIL

TAXLINK

Tax calc. basis calculation (link)

BP

BPRNUM

TDSPRV

Fee total/service supplier

BP

BPRNUM

TMP2855

Temporary table Fisc. Stmt 2855

Company name

CPYNAM

TMPCNSBAN

Bank inquiry

BP

BPR

Bank account number

BID

TMPCNVECAR

Exch. rate temporary table

BP

BPR

TMPCSRQ

Temporary cash requirements

Bill-to BP

BPR

Name

BPRNAM

TMPEXPENSE

Temporary table - Expenses

Miscellaneous BP

EXPBPR

TMPFUP0

Campaign criteria

From customer

BPCDEB

To customer

BPCFIN

Group customer

BPCGRU

Risk BP

BPCRSKSTR

Risk BP

BPCRSKEND

From sales rep

REPDEB1

To sales rep

REPFIN1

From sales rep

REPDEB2

To sales rep

REPFIN2

From sales rep

REPDEB

To sales rep

REPFIN

TMPFUP1

BPs for reminding

Bill-to/Order BP

BPC

TMPFUP2

Open items to remind

BP

BPC

TMPLEARNT

Temporary table

Company name

CPYNAM

TMPLOFGRP

Temporary table

Company name

CPYNAM

Name

FCYNAM

Supplier

BPR

TMPMASLEA

Contract actions temp table

Lessor

LES

TMPPAYDUD

Temporary payment proposal

BP

BPR

Bank account number

BID

TMPPAYDUD2

BP

BPR

Company name

BPRNAM

TRANNOTEH

Transportation note

BP

BPRNUM

Ship-to customer name

BPDNAM

Delivery contact

CNDNAM

Ship-from

SHIFRMNAM

TRANSPORT

Transport

Carrier

BPTNUM

BP code

BPRNUM

UNFILWRK

Unfilled orders report

Sold-to

BPCORD

UPORDER

PO history

Supplier

BPSNUM

Company name

BPRNAM

Company name

BPONAM

Carrier

BPTNUM

Pay-to

BPRPAY

Supplier invoice

BPSINV

Freight agent

FFWNUM

Sold-to

BPCORD

UPORDERQ

PO quantity history

Supplier

BPSNUM

Invoicing BP

BPSINV

VATLINITMGER

German VAT line items

BP

BPR

VSORDER

Sales order history - header

Sold-to

BPCORD

Bill-to customer

BPCINV

Pay-by customer

BPCPYR

Group customer

BPCGRU

Sold-to customer name

BPCNAM

Person to contact

CNTNAM

Bill-to customer name

BPINAM

Invoice contact

CNINAM

Ship-to customer name

BPDNAM

Delivery contact

CNDNAM

Sales rep

REP

Carrier

BPTNUM

Freight agent

FFWNUM

VSORDERC

Cumulative sales order history

Sold-to

BPCORD

Freight agent

FFWNUM

VSORDERP

Sales order history - price

Sold-to

BPCORD

Delivery contact

CNDNAM

Bill-to customer

BPCINV

Sales rep 1

REP1

Sales rep 2

REP2

VSORDERQ

Sales order history - Qties.

Sold-to

BPCORD

Carrier

BPTNUM

WAREHOUSE

Warehouses 

Name

WRHNAM

WARFLYER

Warranty vouchers

Site name

BPANAM

WARREQCPN

Warranty request lines

Reseller

RSL

WARREQUEST

Warranty requests

Customer

BPC

Contact (relationship)

CCN

WHTDTL

WHT detail

BP

BPR

WSTOALL

Allocations

BP

BPRNUM

WSTOREO

Reorder

BP

BPRNUM

Table

Description

Description

Field

AIN

Contact (relationship)

 

 

AUS

User

 

 

BID

Bank account number

 

 

BPA

Address

 

 

BPC

Customer

 

 

BPR

Business partner

 

 

BPS

Supplier

 

 

BPT

Carrier

 

 

COR

Outlook contact

 

 

E164TEL, TEL, TELTC

Phone numbers/fax numbers

 

 

FNA

First name

 

 

GAC

Account (general or individual)

 

 

LDS

Lead

 

 

MAI

Email address

 

 

NAM

Names

 

 

REP

Sales representative

 

 

 

Specifically for the Sage X3 HR & Payroll modules, the standard data types associated with main personal data records are as follows: 

Data type 

Description 

EML 

Employee ID 

 

And fields, contents, and location: 

Table 

Description 

Field 

Description 

Data Type 

EMPLOID 

Civil status 

REFNUM 

Employee ID 

EML 

SRN 

First name 

NAM 

Name 

CIV 

Title 

PSD 

Known as 

NAM 

DATBRN 

Date of birth 

EMPPIC 

Photo 

ABB Image file 

SEX 

Gender 

NTT 

Nationality Code 

CRY 

CRYNAM 

Country name 

NCY 

CTYBRN 

Municipality 

ADD1/ADD2/ADD3 

Address 

ADL 

CTY 

City 

CTY 

CODPOS 

Postal Code 

POS 

TEL 

Telephone 

TEL 

MOB 

Mobile phone 

TEL 

FAX 

Fax 

TEL 

EML 

Email 

NAMCNT 

Person of contact: Name 

NAM 

SRNCNT 

Person of contact: First name 

NAM 

TELCNT 

Person of contact: Telephone 

TEL 

MOBCNT 

Person of contact: Mobile phone 

TEL 

EMLCNT 

Person of contact: Email 

EMPLOCHD 

Children 

CHDNAM 

Name 

CHDSRN 

First Name 

CHDSEX 

Gender 

DATCHDBRN 

Date of Birth 

EMPLOJNT 

Spouses (>1) 

SSITFAM 

Marital Status 

SJNTREFNUM 

Spouse's registration number 

MAT 

SJNTNAM 

Spouse's name 

SJNTSRN 

First name 

SJNTDATBRN 

Date of birth 

SJNTTEL 

Telephone 

TEL 

EMPLOAD 

Administrative information 

FLGHDC 

Disabled worker 

HDC 

Handicap rate 

DCB 

EMPLORIB 

Bank details

BIDNUM 

Bank account number 

BID 

EMPLOMED 

Medical examinations 

MEDDCT 

Doctor 

Security principles

To minimize the risk of data breaches and related penalties, some elementary security principles are recommended. This chapter highlights these principles but it does not prevent you from reading the entire document.

These principles relate to versions V11.0.8, GX V11.0.6, V12.0.14, HR V12.0.8, GX V12.0.19 and 2018 R3. If you use another version, refer to the documentation available for the version you run for more details.

Main principles

Although it remains the customer's responsibility to ensure the system and network are secure, the solution platform provides you with some principles to support this:

  • Standard web browsers and HTTP or HTTPS protocols are used. The web technology provides a first level insulation between the web server and the workstation.
  • Passwords are not transferred on the network. The authentication system is based on standards. It can be a Windows login that is controlled in an LDAP directory, or an Oauth2 authentication (a redirection is done to the authentication server). For the sake of simplicity (or for autonomous demo servers), a fallback solution based on users and encrypted passwords stored in the solution web server is available. However, it should not be used for production environments.
  • The connection between the solution web server and the solution server is based on certificates that are created during the installation by a private certificate authority.
  • Rights management is done at the service level and is based on function profiles associated with the user. It is possible to manage the permissions at an elementary level, function, and action up to the field. It is possible, for example, to obfuscate information depending on the role of the user.
  • Access to the server by the solution processes is restricted by a white list of authorized directories.
  • On the solution web server, node.js and MongoDB do not require all processes and/or services to be root or have administrator privileges.

As a consequence, password management is now different from versions before V7.1 because the security rules for passwords are now managed by the security provider (Google, LDAP) you choose.

Security parameters

The Syracuse web server has different parameters to fine tune the security. The configuration is based on a dedicated security section in the nodelocal.js file.

HTTP headers

Clickjacking

The server is protected against clickjacking by adding the x-frame-options: DENY HTTP header.

If for any reason you need to put the site in an iFrame, you can do it at your own risk by overriding the default as follows:

exports.config = {
	security: {
	     http: {
		headers: {
	// set 'x-frame-options' to enable embedding into another site via iframe
	// 'x-frame-options': 'allow-from http://other-site',
	   'x-frame-options': 'SAMEORIGIN', // default value is 'DENY'
			},
		  },
	         },
};

Before U9.0.3, the header was directly under the HTTP as follows:

exports.config = {
	security: {
		http: {
		// set 'x-frame-options' to enable embedding into another site via iframe
		// 'x-frame-options': 'allow-from http://other-site',
		// 'x-frame-options': 'SAMEORIGIN',
		'x-frame-options': 'DENY' // default value
		},
	},
};

XSS and other defense headers

Any header in the headers property is added to the response. By default, the following are added:

  • x-content-type-options: nosniff: Prevents Internet Explorer and Google Chrome from MIME-sniffing.
  • x-xss-protection: 1; mode=block: Enables the Cross-site scripting (XSS) filter built into most recent web browsers.
  • content-security-policy: frame-ancestors 'self': New standard to prevent clickjacking and that allows your site only.

The content-security-policy has many directives you can use to control what the browser can render. Among all directives, we can mention:

  • script-src: Trusts only script sources in the list.
  • child-src: Trusts only embedded content in the list. This directive controls what can be loaded in an iFrame.
  • frame-ancestors: Similar to the x-frame-options header, but if both exists, the W3C specifications mention that frame-ancestors must be used.

These directives can be modified as sub-properties of content-security-policy as follows:

exports.config = {
	security: {
		http: {
			headers: {
				"content-security-policy": {
					"child-src": ["'self'", "www.w3schools.com"
					]
				},
			},
	},
};

HTML5 rocks provides a good tutorial on the subject.

Content security

The user interface can include external content by using an iFrame. Including such content may put the security of the site at risk, but you can reduce that risk by adding the sandbox attribute to the iFrame HTML tag.

iFrame sandbox

HTML gadgets support 3 levels of security (low, medium, high) depending on what you want to authorize.

These levels define the sandbox attribute as follows:

  • low: "allow-same-origin allow-forms allow-popups allow-scripts"
  • medium: "allow-forms allow-scripts"
  • high: ""

Customizing the sandbox

You can change the default values of the three levels by editing the security section of the nodelocal.js file.

exports.config = {
  security: {
    client: {
      iframe: {
        sandbox: {
	// allow-		forms		Enables form submission
	// allow-pointer-	lock		Enables pointer APIs (for example pointer position)
	// allow-		popups		Enables popups
	// allow-same-		origin		Allows the iframe content to be treated as being from the same origin
	// allow-		scripts		Enables scripts
	// allow-top-		navigation	Allows the iframe content to navigate its top-level browsing context
	// low: null, // if null no sandbox attribute is added
			(not recommended)
	// medium: null, // if null no sandbox attribute is added
			(not recommended)
	// medium: "",
	medium: "allow-same-origin allow-forms allow-scripts",
	// high: ""
	}
      }
    },
  },
};

By combining the sandbox attribute and the child-src directive of the content-security-policy, you can have a better control of what can be rendered in the browser.

Security best practices

Security has been a strong focus in the design and development of the solution, which has been audited and certified by an external authority for safe operation in the cloud.

A security policy is always compromised by its weakest link. It is therefore critical to pay attention to the security of your system, and to use all available tools for this.

This document summarizes what you should pay attention to when implementing the solution.

General security guidelines

Securing your solution on-premise architecture should not be considered optional. Sensitive or personal data, such as customer details, financial records, or staff information, is stored using your business software. This may be stored on your own servers, if you have in-house systems, or outside your business if you use cloud computing services.

You get maximum security for your data without any action if you use Sage X3 cloud. However, if you choose to install the solution as an on-premises instance, or if you host it with a non-Sage managed cloud provider, there are a few rules to follow. It is important to take a multi-layered, industry proven approach to keep your data where it belongs and as secure as possible. This document reviews the main controls you should implement to secure your data.

General guidelines

Always use HTTPS if your server is visible on the internet

The solution is a web application that can be accessed using an HTTP or HTTPS connection. Although HTTP is available, we recommend you always use https for production instances, especially if your solution is accessed from the public internet.

Use strong passwords

Make sure you change the default administrator password to a strong password after the application setup. Ideally, it should:

  • Contain six characters minimum; the longer the password is, the stronger it is.
  • Use a combination of digits, uppercase and lowercase letters, and symbols such as @ # $ % ! ? &, etc.
  • Not contain words that can be found in dictionaries or that are part of the user name.
  • Not contain a keyboard pattern such as "qwerty."
  • Not contain your date of birth.
Always use advanced authentication on a production instance

The solution supports several state-of-the-art services (such as LDAP and OAuth2) that should be used for user authentication on production instances, or on any instance holding sensitive data. Refer to the guides on setting up advanced authentication for more details.

We do not recommend using basic authentication (user and password) except on implementation or test instances. Even then, make sure those instances do not contain any sensitive data because basic authentication exposes you to inside and outside threats.

A user account should never be shared to ensure traceability of user actions.
Secure your servers with tight user access rights

The servers that host the solution components contain configuration files and other data vulnerable to inside threats. Administrators should be the only persons allowed to log in to the servers. Make sure you set up users for the solution administration with the appropriate rights to the relevant directories.

Do not mix server administrators with the solution administrators.

The solution servers should be built using industry-standard guidelines that are freely available.

Use local firewalls

Use local firewalls on your servers to lock any IP port that is not needed to operate the solution or for user access. Typically, if all the solution components are installed on a single server, the solution only needs the HTTP or HTTPS ports to function. For multiple-server installations, you need to open the ports (or ranges of ports) that the solution components use to communicate with each other.

Building a secure internet architecture

The architecture you implement is key to your security, especially if your system can be accessed from the public internet. To connect your systems and make them available from the internet, you have to decide:

  • Which servers and ports need to be seen from the outside world.
  • How any of the queries coming from the outside world are intercepted, translated, and directed to those servers and ports, if applicable.

This involves equipment such as:

  • A firewall, which sits between your internal network and the internet to intercept incoming queries and forward them to the proper servers inside your network.
  • A Demilitarized Zone or DMZ, which is a physical or logical network area that isolates your LAN from the internet.

The firewall is the guard at your DMZ’s checkpoints.

Recommended firewall settings if your instance is visible on the public internet

These recommendations only apply if you are setting up a solution that can be accessed from the public internet. You do not need to set up a DMZ and external firewalls if you are using the solution from your internal LAN only.

The solution uses several components that communicate together through IP ports. The only port that actually needs to be accessed by users for the solution to operate is the HTTP or HTTPS port (8124 or 843 by default). All other ports can (and must) be protected from external access, especially if the server is accessible from the internet. The MongoDB port (27017 by default) and the Elasticsearch port (9200 by default) are examples of ports that should not be available.

Ideally, your solution HTTPS port should not be reachable directly from the public internet, but rather through a DMZ and reverse proxy, as shown in the example below:

Alternatively, you can expose the web (Syracuse) server alone, with all ports protected except HTTPS, and with the strongest possible authentication service (not basic). All other servers should then be placed safely in your LAN.

Never open a server to the public internet without filtering the ports using a firewall. Only allow the $$PRODUCT HTTPS port through.

Security implementation in details

Authentication

The solution supports several identity providers, such as:

  • LDAP (for on-premise installations only)
  • Oauth2 (with a Gmail account or a Microsoft account)
  • Sage ID

This improves security by offloading the management of user credentials that do not transit through the ERP (when integrated with Oauth2 identity providers or with a Sage ID). It also improves the user experience by providing a Single Sign-On (SSO) experience.

You can securely store the credentials you generate in password managers such as KeePass.
You can use any of the authentication methods described above, but you should never use the basic authentication in production because it is only intended for demos.

Authorization

On the web platform

Once authenticated, users are connected to the platform with a user login account. Each user belongs to at least one group, and each group is associated with a role.

When logging in, the user can select the role to use among the list of authorized roles. This role is linked to a security profile which is associated with a level: 0 to 99, 0 being the most powerful.

The security profile defines the privileges a user has on platform operations. Make sure you assign a set of roles with appropriate security profiles to each user. As the platform administrator, you can define as many roles and security profiles as necessary.

A security profile can grant 12 different privileges, of which the following are critical for security:

  • myProfile allows users to modify information related to their own identification (name, password, email address, photo). It also grants them read access to their own context (sessions they opened, endpoints they have access to, etc.). This access can be granted to most users.
  • Users allows the definition of new users and should be granted only to platform administrators. However, modification rights can be granted to some key users. They are then able to modify the information associated to users with lower security profiles.
  • TechnicalSettings allows access to the technical configuration (endpoints, $$PRODUCT solutions, etc.). It should only be granted to the persons in charge of the platform technical administration.
  • Development allows access to resources for users working on extending the standard by bespoke or vertical developments.
On the folders

What we call a folder is the repository that contains business data related to one or more companies having one or more sites (each company is linked to a legislation code). A folder is identified as an endpoint on the platform. Groups specify the endpoints a user is allowed to connect to. This list is critical for security.

Make sure each user is only granted access to the appropriate list of folders.

A user who connects to the platform is identified by a user code in each folder. By default, the user code and the user login account are the same. However, it is possible to redefine the user code for each endpoint in the user administration page.

In each folder, it is possible to define access to the information at a very detailed level:

  • A user has a function profile, and can have read, write, delete, and execute access on every function. If the function manages data associated with companies or sites, the authorizations can be set up differently for each company and/or site.
  • Row level permissions filter data on any property. For example, a user is only authorized to access the list of customers of a given sales order.
  • Access codes restrict the access to records or properties so that only selected users can see and edit them.
  • Access to reports can be filtered with access codes for each user and report. However, it is simpler to manage them by groups, and grant rights for each group.

Use these features to set up the access to critical data differently on each folder for a given user.

Make sure you maintain these rules over time. Keep them as simple as possible, without compromising the security policy you need to enforce.

For each folder, there is a main administrator user code. It is ADMIN by default, but you can change in the the ADMUSR - Super user parameter (SUP chapter, SEC group). Only use this user code for tasks that require it.

Network security

As the solution runs on multiple physical or logical servers connected through a server, the security of this network is very important. The best practices for network security are as follows:

  • Only open access to the servers on the ports that are necessary for normal use. For example, only open the HTTP (80 by default) and HTTPS (443 by default) ports on the server running node.js.
  • Install and set up firewalls and all the tools needed to ensure physical security.
  • Client connections can run in HTTP or HTTPS mode. Using HTTPS is strongly recommended if the connected device accesses the web server through the internet.
  • To secure the connection between different environments, the solution uses certificates, which are generated during installation with a master certificate. The private key of this master certificate must be kept safe on a computer with restricted access.

Database security

Databases must be secured following the principles listed below.

Relational database

The server on which the relational database is installed must not be exposed over the network.

Only the solution server (application/runtime) and the report server can access RDBMS. Execution servers and report servers are proxies that get the data requested by external services. Never set up the database connection to the platform with the database administrator account. This account is only required for some configuration steps, and it can be changed later.

MongoDB database

The servers on which the document database is installed must not be exposed over the network. Only the web server (node.js) needs access to the MongoDB database.

Search engine

The servers on which Elasticsearch is installed must not be exposed over the network. It should only be accessible from the node.js servers. The solution platform sends the query to Elasticsearch with additional security filters, based on the privileges of the user. When you access the Elasticsearch server directly, you can bypass these security filters: this compromises security by returning all the relevant indexed data.

File system security

The file system security of the different servers should be implemented with the relevant tools (antivirus, network access security, etc.) at the right level. Make sure these tools do not cause performance issues. For example, avoid running a continuous antivirus scan on a database server.

On application and process servers, the solution engine runs in a sandbox. This allows you to control the system commands that are launched, and the location where files can be read, created, modified, or deleted. This prevents malicious code written for the execution engine from running operating system commands (by using system instructions).

Setting up the sandbox is recommended, especially if you operate in a cloud, or if the solution code is supplied by external vendors.

Development rules

The solution is supplied with a developer workbench that allows bespoke development. This can bring additional security threats that you can address with the following best practices:

SQL injection

The solution language includes ExecSQL and SQL functions with an argument that can be evaluated. All data used to build SQL statements must be properly escaped.

HTML injection

This security issue can only happen when additional graphical components are added to the user interface. At the moment, the extensibility tool is only available for early adopters. Detailed security guidelines are given to developers, but they are out of the scope of this document. A dedicated security audit is done on additional components supplied by external providers to prevent this risk.

Audit

The solution includes a set of tools that might be activated in production. This is a best practice after a period of operation, especially with the following tools:

  • An audit trail of all the operations. The parameter that activates this audit trail is called TABTRA. According to its value, you can set up a recording on all the operations, or only on the deletion /renaming operations. It can be set up at the user level, or more globally.
  • An audit collection (from V12) can be set up on administrative data in MongoDB.
  • Database triggers. They can be set on tables to store previous and new values of given columns, based on simple conditions.
  • A workflow engine. It can store any information related to triggering events that can be set up with various conditions in a history table.
Using some of these tools (especially the first two) can significantly impact performance. It is therefore recommended to use them only for a short period of time, and for a limited number of users, when applicable.

Data retention rules

All local laws enforce some minimum data retention rules about data, transactions and reports.

You can find here, for informational purposes only, some examples of retention rules that apply for countries where the solution operates.

Sage cannot guarantee the accuracy of the information on external sites. The information could change without notice and should always be validated by legal advisers.

Country

Reference

FR

https://www.economie.gouv.fr/entreprises/entreprises-combien-temps-devez-vous-conserver-documents

DE

https://de.wikipedia.org/wiki/Aufbewahrungspflicht#Aufbewahrungsfristen_in_Deutschland

AT

https://www.bmf.gv.at/steuern/selbststaendige-unternehmer/betriebliches-rechnungswesen/br-aufbewahrungspflicht.html

CH

http://www.aarejura.ch/download/Vortraege/praesentation_aufbewahrungspflicht.pdf

CA

https://www.canada.ca/en/revenue-agency/services/forms-publications/publications/ic78-10/books-records-retention-destruction.html