Getting Started

NC eProcurement has been the State's online purchasing system since 2001, and was upgraded to an enhanced cloud platform of the SAP Ariba Procurement software in July 2020. Users will have two views of the system to choose from, Guided Buying or Expert View, although the information shared between them is exactly the same.

For more detailed step-by-step information regarding this topic in a printable format, see the following job aid.

Open the Job Aid

Tab/Accordion Items

NC eProcurement uses NCID credentials to log in.

Guided Buying is the newest view for NC eProcurement and is the default landing page when a user logs in. It has a familiar online shopping appearance designed to make routine purchases easier for basic users, especially from Statewide Term Contracts.

Expert View is geared towards all actions of the procurement cycle and offers a more robust, customizable view than Guided Buying.

The NC eProcurement Purchasing Lifecycle for NCFS Agencies:

  • Composing
  • Submitted
  • Ordered
  • Receiving
  • Received

The system's search functionality gives users the ability to search NC eProcurement to locate and view the following items:

  • Requisitions
  • Purchase Orders
  • Receipts
  • User Profile Changes
  • Catalog Items

A user's Personal Profile includes information that can be defaulted to automatically populate on all Requisitions created by that user such as billing, shipping, and accounting information.

Email Notifications are messages that NC eProcurement automatically sends to users in various situations reminding them to take action on something or letting them know that someone else has.  The types of notifications and the frequency with which they are sent to the user can be configured by the user.

Approvers can temporarily delegate their approval authority to another user so as not to interrupt the flow of purchases in the event of an absence.

NC eProcurement should work in all browsers, although Google Chrome is recommended when possible.

NC eProcurement has a few built-in security features including NCID authentication and a forced system logout after 30 minutes of inactivity.