ABAP program or external program can be specified to be run
in the background. More than one program can be executed with a single
background job. To do it you should add a job step for each program.
Let us first discuss the procedure for creating an ABAP
report.
The Users field will, by default, display your name,
indicating that the user (you) is authorized to run this program.
In case there is another user authorized for scheduling the
job, then the default name is changed and system displays the name of the other
user.
Now choose ABAP and enter the name of the report.
Choose variant from the Variant list. Specify the language
you want the report to be in.
With Print specifications, you can specify whether you want
the report output to be held in the SAP spool system or have it printed as soon
as the job has run.
For external command, by default, the job step will run
under your SAP System authorizations. So your name will appear in the User
field.
But if the program is running under the authorization of another
user, you can change this default option by entering another user name.
Then choose External command and enter the predefined SAP
name. If required, enter any additional arguments required for the command.
The host system on which the command should run and the type
of operating system at the host should be specified. You can determine the host
name using the host name command on the target host system.
You can also specify how the output from the external
program should be treated, as well as other runtime options by using Control
flags. It is advisable to use default settings for these options. If you are
authorized for background processing, you can also choose External programs as
a job step option.
To run an external program, enter the exact path, program or
script name, arguments required by the program, and the name of the host system
on which the program is to run. After this, save the job step and return to the
job identification screen.
Note that in the SAP system the ABAP programs are not
predefined; therefore, the system does not perform an authorization check.
Hence, the system does not bother to check whether you are allowed to use the
command.