Entering navigation tree
Entering Level 1 Node Cross System Lock (BC-CST-EQ)Cross System Lock (BC-CST-EQ)Leaving Level 1 Node Cross System Lock (BC-CST-EQ)
   Entering Level 2 Node Overview and ConceptsOverview and ConceptsLeaving Level 2 Node Overview and Concepts
      Entering Level 3 Node The Token ConceptThe Token ConceptLeaving Level 3 Node The Token Concept
      Entering Level 3 Node Converting the Token ConceptConverting the Token ConceptLeaving Level 3 Node Converting the Token Concept
      Entering Level 3 Node Points of Contact Between CSL and SAP Locking ConceptPoints of Contact Between CSL and SAP Locking ConceptLeaving Level 3 Node Points of Contact Between CSL and SAP Locking Concept
      Entering Level 3 Node Lock Object TypesLock Object TypesLeaving Level 3 Node Lock Object Types
      Entering Level 3 Node Duration of a CSL LockDuration of a CSL LockLeaving Level 3 Node Duration of a CSL Lock
         Entering Level 4 Node Cross-System LocksCross-System LocksLeaving Level 4 Node Cross-System Locks
         Entering Level 4 Node Cross-Transaction LocksCross-Transaction LocksLeaving Level 4 Node Cross-Transaction Locks
      Entering Level 3 Node Process Flow of a Token RequestProcess Flow of a Token RequestLeaving Level 3 Node Process Flow of a Token Request
   Entering Level 2 Node Programming with the CSLProgramming with the CSLLeaving Level 2 Node Programming with the CSL
      Entering Level 3 Node Function Module OverviewFunction Module OverviewLeaving Level 3 Node Function Module Overview
      Entering Level 3 Node Process Flow for Cross-System LocksProcess Flow for Cross-System LocksLeaving Level 3 Node Process Flow for Cross-System Locks
      Entering Level 3 Node Process Flow for Cross-Transaction LocksProcess Flow for Cross-Transaction LocksLeaving Level 3 Node Process Flow for Cross-Transaction Locks
         Entering Level 4 Node Application ExampleApplication ExampleLeaving Level 4 Node Application Example
   Entering Level 2 Node Customizing SettingsCustomizing SettingsLeaving Level 2 Node Customizing Settings
      Entering Level 3 Node Activating the CSLActivating the CSLLeaving Level 3 Node Activating the CSL
      Entering Level 3 Node Mapping Onto Lock Object TypesMapping Onto Lock Object TypesLeaving Level 3 Node Mapping Onto Lock Object Types
      Entering Level 3 Node RFC PortsRFC PortsLeaving Level 3 Node RFC Ports
      Entering Level 3 Node SERM Model of the Customizing DataSERM Model of the Customizing DataLeaving Level 3 Node SERM Model of the Customizing Data
   Entering Level 2 Node CSL MonitorCSL MonitorLeaving Level 2 Node CSL Monitor
      Entering Level 3 Node Selection CriteriaSelection CriteriaLeaving Level 3 Node Selection Criteria
      Entering Level 3 Node Results ListResults ListLeaving Level 3 Node Results List