Start Level 1 Node: Cross System Lock (BC-CST-EQ)Cross System Lock (BC-CST-EQ)End Level 1 Node: Cross System Lock (BC-CST-EQ)
   Start Level 1 Node: Overview and ConceptsOverview and ConceptsEnd Level 1 Node: Overview and Concepts
      Start Level 2 Node: The Token ConceptThe Token ConceptEnd Level 2 Node: The Token Concept
      Start Level 2 Node: Implementing the Token ConceptImplementing the Token ConceptEnd Level 2 Node: Implementing the Token Concept
      Start Level 2 Node: Points of Contact Between CSL and SAP Locking ConceptPoints of Contact Between CSL and SAP Locking ConceptEnd Level 2 Node: Points of Contact Between CSL and SAP Locking Concept
      Start Level 2 Node: Lock Object TypesLock Object TypesEnd Level 2 Node: Lock Object Types
      Start Level 2 Node: Duration of a CSL LockDuration of a CSL LockEnd Level 2 Node: Duration of a CSL Lock
         Start Level 3 Node: Cross-System LocksCross-System LocksEnd Level 3 Node: Cross-System Locks
         Start Level 3 Node: Cross-Transaction LocksCross-Transaction LocksEnd Level 3 Node: Cross-Transaction Locks
      Start Level 2 Node: Process Flow of a Token RequestProcess Flow of a Token RequestEnd Level 2 Node: Process Flow of a Token Request
   Start Level 1 Node: Programming with the CSLProgramming with the CSLEnd Level 1 Node: Programming with the CSL
      Start Level 2 Node: Function Module OverviewFunction Module OverviewEnd Level 2 Node: Function Module Overview
      Start Level 2 Node: Process Flow for Cross-System LocksProcess Flow for Cross-System LocksEnd Level 2 Node: Process Flow for Cross-System Locks
      Start Level 2 Node: Process Flow for Cross-Transaction LocksProcess Flow for Cross-Transaction LocksEnd Level 2 Node: Process Flow for Cross-Transaction Locks
         Start Level 3 Node: Application ExampleApplication ExampleEnd Level 3 Node: Application Example
   Start Level 1 Node: Settings in CustomizingSettings in CustomizingEnd Level 1 Node: Settings in Customizing
      Start Level 2 Node: Activating the CSLActivating the CSLEnd Level 2 Node: Activating the CSL
      Start Level 2 Node: Mapping Onto Lock Object TypesMapping Onto Lock Object TypesEnd Level 2 Node: Mapping Onto Lock Object Types
      Start Level 2 Node: RFC PortsRFC PortsEnd Level 2 Node: RFC Ports
      Start Level 2 Node: SERM Model of the Customizing DataSERM Model of the Customizing DataEnd Level 2 Node: SERM Model of the Customizing Data
   Start Level 1 Node: CSL MonitorCSL MonitorEnd Level 1 Node: CSL Monitor
      Start Level 2 Node: Selection CriteriaSelection CriteriaEnd Level 2 Node: Selection Criteria
      Start Level 2 Node: Results ListResults ListEnd Level 2 Node: Results List