Start Level 1 Node: Cross System Lock (BC-CST-EQ)Cross System Lock (BC-CST-EQ)End Level 1 Node: Cross System Lock (BC-CST-EQ)
   Start Level 2 Node: Overview and ConceptsOverview and ConceptsEnd Level 2 Node: Overview and Concepts
      Start Level 3 Node: The Token ConceptThe Token ConceptEnd Level 3 Node: The Token Concept
      Start Level 3 Node: Converting the Token ConceptConverting the Token ConceptEnd Level 3 Node: Converting the Token Concept
      Start Level 3 Node: Points of Contact Between CSL and SAP Locking ConceptPoints of Contact Between CSL and SAP Locking ConceptEnd Level 3 Node: Points of Contact Between CSL and SAP Locking Concept
      Start Level 3 Node: Lock Object TypesLock Object TypesEnd Level 3 Node: Lock Object Types
      Start Level 3 Node: Duration of a CSL LockDuration of a CSL LockEnd Level 3 Node: Duration of a CSL Lock
         Start Level 4 Node: Cross-System LocksCross-System LocksEnd Level 4 Node: Cross-System Locks
         Start Level 4 Node: Cross-Transaction LocksCross-Transaction LocksEnd Level 4 Node: Cross-Transaction Locks
      Start Level 3 Node: Process Flow of a Token RequestProcess Flow of a Token RequestEnd Level 3 Node: Process Flow of a Token Request
   Start Level 2 Node: Programming with the CSLProgramming with the CSLEnd Level 2 Node: Programming with the CSL
      Start Level 3 Node: Function Module OverviewFunction Module OverviewEnd Level 3 Node: Function Module Overview
      Start Level 3 Node: Process Flow for Cross-System LocksProcess Flow for Cross-System LocksEnd Level 3 Node: Process Flow for Cross-System Locks
      Start Level 3 Node: Process Flow for Cross-Transaction LocksProcess Flow for Cross-Transaction LocksEnd Level 3 Node: Process Flow for Cross-Transaction Locks
         Start Level 4 Node: Application ExampleApplication ExampleEnd Level 4 Node: Application Example
   Start Level 2 Node: Customizing SettingsCustomizing SettingsEnd Level 2 Node: Customizing Settings
      Start Level 3 Node: Activating the CSLActivating the CSLEnd Level 3 Node: Activating the CSL
      Start Level 3 Node: Mapping Onto Lock Object TypesMapping Onto Lock Object TypesEnd Level 3 Node: Mapping Onto Lock Object Types
      Start Level 3 Node: RFC PortsRFC PortsEnd Level 3 Node: RFC Ports
      Start Level 3 Node: SERM Model of the Customizing DataSERM Model of the Customizing DataEnd Level 3 Node: SERM Model of the Customizing Data
   Start Level 2 Node: CSL MonitorCSL MonitorEnd Level 2 Node: CSL Monitor
      Start Level 3 Node: Selection CriteriaSelection CriteriaEnd Level 3 Node: Selection Criteria
      Start Level 3 Node: Results ListResults ListEnd Level 3 Node: Results List