Start Level 1 Node: SAP ERP Central Component Security GuideSAP ERP Central Component Security GuideEnd Level 1 Node: SAP ERP Central Component Security Guide
   Start Level 2 Node: IntroductionIntroductionEnd Level 2 Node: Introduction
   Start Level 2 Node: Before You StartBefore You StartEnd Level 2 Node: Before You Start
   Start Level 2 Node: Technical System LandscapeTechnical System LandscapeEnd Level 2 Node: Technical System Landscape
   Start Level 2 Node: User Management and AuthenticationUser Management and AuthenticationEnd Level 2 Node: User Management and Authentication
      Start Level 3 Node: User ManagementUser ManagementEnd Level 3 Node: User Management
      Start Level 3 Node: User Data SynchronizationUser Data SynchronizationEnd Level 3 Node: User Data Synchronization
      Start Level 3 Node: Integration with Single Sign-On EnvironmentsIntegration with Single Sign-On EnvironmentsEnd Level 3 Node: Integration with Single Sign-On Environments
   Start Level 2 Node: AuthorizationsAuthorizationsEnd Level 2 Node: Authorizations
   Start Level 2 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 2 Node: Network and Communication Security
      Start Level 3 Node: Communication Channel SecurityCommunication Channel SecurityEnd Level 3 Node: Communication Channel Security
      Start Level 3 Node: Network SecurityNetwork SecurityEnd Level 3 Node: Network Security
      Start Level 3 Node: Communication DestinationsCommunication DestinationsEnd Level 3 Node: Communication Destinations
   Start Level 2 Node: Data Storage SecurityData Storage SecurityEnd Level 2 Node: Data Storage Security
   Start Level 2 Node: Security for Other ApplicationsSecurity for Other ApplicationsEnd Level 2 Node: Security for Other Applications
   Start Level 2 Node: Trace and Log FilesTrace and Log FilesEnd Level 2 Node: Trace and Log Files
   Start Level 2 Node: Cross-Application ComponentsCross-Application ComponentsEnd Level 2 Node: Cross-Application Components
      Start Level 3 Node: Cross-Application Time Sheet (CA-TS)Cross-Application Time Sheet (CA-TS)End Level 3 Node: Cross-Application Time Sheet (CA-TS)
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Communication DestinationsCommunication DestinationsEnd Level 4 Node: Communication Destinations
      Start Level 3 Node: Self-ServicesSelf-ServicesEnd Level 3 Node: Self-Services
         Start Level 4 Node: Before You StartBefore You StartEnd Level 4 Node: Before You Start
         Start Level 4 Node: User ManagementUser ManagementEnd Level 4 Node: User Management
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
            Start Level 5 Node: Editing Roles and Authorizations for Web Dynpro ServicesEditing Roles and Authorizations for Web Dynpro ServicesEnd Level 5 Node: Editing Roles and Authorizations for Web Dynpro Services
            Start Level 5 Node: Authorizations for Controlling Services (MSS, BUA)Authorizations for Controlling Services (MSS, BUA)End Level 5 Node: Authorizations for Controlling Services (MSS, BUA)
            Start Level 5 Node: Authorizations for BW iViews (MSS)Authorizations for BW iViews (MSS)End Level 5 Node: Authorizations for BW iViews (MSS)
         Start Level 4 Node: Communication DestinationsCommunication DestinationsEnd Level 4 Node: Communication Destinations
      Start Level 3 Node: Enterprise ServicesEnterprise ServicesEnd Level 3 Node: Enterprise Services
         Start Level 4 Node: Before You StartBefore You StartEnd Level 4 Node: Before You Start
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 4 Node: Network and Communication Security
   Start Level 2 Node: AccountingAccountingEnd Level 2 Node: Accounting
      Start Level 3 Node: Financial AccountingFinancial AccountingEnd Level 3 Node: Financial Accounting
         Start Level 4 Node: Authorizations in Financial AccountingAuthorizations in Financial AccountingEnd Level 4 Node: Authorizations in Financial Accounting
         Start Level 4 Node: General Ledger Accounting (FI-GL)General Ledger Accounting (FI-GL)End Level 4 Node: General Ledger Accounting (FI-GL)
            Start Level 5 Node: ConsolidationConsolidationEnd Level 5 Node: Consolidation
         Start Level 4 Node: Accounts Payable Accounting (FI-AP)Accounts Payable Accounting (FI-AP)End Level 4 Node: Accounts Payable Accounting (FI-AP)
         Start Level 4 Node: Accounts Receivable Accounting (FI-AR)Accounts Receivable Accounting (FI-AR)End Level 4 Node: Accounts Receivable Accounting (FI-AR)
         Start Level 4 Node: Bank Accounting (FI-BL)Bank Accounting (FI-BL)End Level 4 Node: Bank Accounting (FI-BL)
         Start Level 4 Node: Asset Accounting (FI-AA)Asset Accounting (FI-AA)End Level 4 Node: Asset Accounting (FI-AA)
         Start Level 4 Node: Travel Management (FI-TV)Travel Management (FI-TV)End Level 4 Node: Travel Management (FI-TV)
         Start Level 4 Node: Authorizations in the Special Purpose Ledger (FI-SL)Authorizations in the Special Purpose Ledger (FI-SL)End Level 4 Node: Authorizations in the Special Purpose Ledger (FI-SL)
         Start Level 4 Node: TreasuryTreasuryEnd Level 4 Node: Treasury
            Start Level 5 Node: AuthorizationsAuthorizationsEnd Level 5 Node: Authorizations
      Start Level 3 Node: Accounting EngineAccounting EngineEnd Level 3 Node: Accounting Engine
         Start Level 4 Node: IntroductionIntroductionEnd Level 4 Node: Introduction
         Start Level 4 Node: Before You StartBefore You StartEnd Level 4 Node: Before You Start
         Start Level 4 Node: Technical System LandscapeTechnical System LandscapeEnd Level 4 Node: Technical System Landscape
         Start Level 4 Node: User Administration and AuthenticationUser Administration and AuthenticationEnd Level 4 Node: User Administration and Authentication
            Start Level 5 Node: User ManagementUser ManagementEnd Level 5 Node: User Management
            Start Level 5 Node: Integration into Single Sign-On EnvironmentsIntegration into Single Sign-On EnvironmentsEnd Level 5 Node: Integration into Single Sign-On Environments
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 4 Node: Network and Communication Security
            Start Level 5 Node: Communication Channel SecurityCommunication Channel SecurityEnd Level 5 Node: Communication Channel Security
            Start Level 5 Node: Communication DestinationsCommunication DestinationsEnd Level 5 Node: Communication Destinations
         Start Level 4 Node: Data Storage SecurityData Storage SecurityEnd Level 4 Node: Data Storage Security
      Start Level 3 Node: Financial Supply Chain ManagementFinancial Supply Chain ManagementEnd Level 3 Node: Financial Supply Chain Management
         Start Level 4 Node: SAP Biller Direct Security GuideSAP Biller Direct Security GuideEnd Level 4 Node: SAP Biller Direct Security Guide
         Start Level 4 Node: SAP Collections Management 6.0SAP Collections Management 6.0End Level 4 Node: SAP Collections Management 6.0
         Start Level 4 Node: SAP Credit Management Security GuideSAP Credit Management Security GuideEnd Level 4 Node: SAP Credit Management Security Guide
         Start Level 4 Node: SAP Dispute Management 6.0SAP Dispute Management 6.0End Level 4 Node: SAP Dispute Management 6.0
         Start Level 4 Node: In-House Cash (IHC)In-House Cash (IHC)End Level 4 Node: In-House Cash (IHC)
      Start Level 3 Node: Management of Internal Controls: Security GuideManagement of Internal Controls: Security GuideEnd Level 3 Node: Management of Internal Controls: Security Guide
         Start Level 4 Node: Technical System LandscapeTechnical System LandscapeEnd Level 4 Node: Technical System Landscape
         Start Level 4 Node: User Management and AuthorizationsUser Management and AuthorizationsEnd Level 4 Node: User Management and Authorizations
            Start Level 5 Node: User ManagementUser ManagementEnd Level 5 Node: User Management
            Start Level 5 Node: Roles and Authorizations ConceptRoles and Authorizations ConceptEnd Level 5 Node: Roles and Authorizations Concept
               Start Level 6 Node: Standard Roles and Authorization ObjectsStandard Roles and Authorization ObjectsEnd Level 6 Node: Standard Roles and Authorization Objects
               Start Level 6 Node: Editing MIC-Specific RolesEditing MIC-Specific RolesEnd Level 6 Node: Editing MIC-Specific Roles
                  Start Level 7 Node: Tasks: Central Structure SetupTasks: Central Structure SetupEnd Level 7 Node: Tasks: Central Structure Setup
                  Start Level 7 Node: Tasks: Structure Setup Specific to Organizational UnitsTasks: Structure Setup Specific to Organizational UnitsEnd Level 7 Node: Tasks: Structure Setup Specific to Organizational Units
                  Start Level 7 Node: Tasks: Control Assessments and TestsTasks: Control Assessments and TestsEnd Level 7 Node: Tasks: Control Assessments and Tests
                  Start Level 7 Node: Tasks: Management Control Assessment and TestTasks: Management Control Assessment and TestEnd Level 7 Node: Tasks: Management Control Assessment and Test
                  Start Level 7 Node: Tasks: Reporting and Sign-OffTasks: Reporting and Sign-OffEnd Level 7 Node: Tasks: Reporting and Sign-Off
               Start Level 6 Node: Assigning Roles to PersonsAssigning Roles to PersonsEnd Level 6 Node: Assigning Roles to Persons
            Start Level 5 Node: Integration with Single Sign-On EnvironmentsIntegration with Single Sign-On EnvironmentsEnd Level 5 Node: Integration with Single Sign-On Environments
         Start Level 4 Node: Communication Channel SecurityCommunication Channel SecurityEnd Level 4 Node: Communication Channel Security
         Start Level 4 Node: Data Storage SecurityData Storage SecurityEnd Level 4 Node: Data Storage Security
      Start Level 3 Node: Master Data FrameworkMaster Data FrameworkEnd Level 3 Node: Master Data Framework
         Start Level 4 Node: IntroductionIntroductionEnd Level 4 Node: Introduction
         Start Level 4 Node: Before You StartBefore You StartEnd Level 4 Node: Before You Start
         Start Level 4 Node: Technical System LandscapeTechnical System LandscapeEnd Level 4 Node: Technical System Landscape
         Start Level 4 Node: User Administration and AuthenticationUser Administration and AuthenticationEnd Level 4 Node: User Administration and Authentication
            Start Level 5 Node: User ManagementUser ManagementEnd Level 5 Node: User Management
            Start Level 5 Node: Integration into Single Sign-On EnvironmentsIntegration into Single Sign-On EnvironmentsEnd Level 5 Node: Integration into Single Sign-On Environments
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 4 Node: Network and Communication Security
            Start Level 5 Node: Communication Channel SecurityCommunication Channel SecurityEnd Level 5 Node: Communication Channel Security
      Start Level 3 Node: ControllingControllingEnd Level 3 Node: Controlling
         Start Level 4 Node: Authorizations in ControllingAuthorizations in ControllingEnd Level 4 Node: Authorizations in Controlling
         Start Level 4 Node: Authorizations in Profit Center AccountingAuthorizations in Profit Center AccountingEnd Level 4 Node: Authorizations in Profit Center Accounting
         Start Level 4 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 4 Node: Network and Communication Security
            Start Level 5 Node: Communication DestinationsCommunication DestinationsEnd Level 5 Node: Communication Destinations
      Start Level 3 Node: SAP BankingSAP BankingEnd Level 3 Node: SAP Banking
         Start Level 4 Node: SAP Financial Customer Information Management (FS-BP)SAP Financial Customer Information Management (FS-BP)End Level 4 Node: SAP Financial Customer Information Management (FS-BP)
            Start Level 5 Node: AuthorizationsAuthorizationsEnd Level 5 Node: Authorizations
            Start Level 5 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 5 Node: Network and Communication Security
               Start Level 6 Node: Communication DestinationsCommunication DestinationsEnd Level 6 Node: Communication Destinations
            Start Level 5 Node: Data Storage SecurityData Storage SecurityEnd Level 5 Node: Data Storage Security
         Start Level 4 Node: Bank Customer Accounts (BCA)Bank Customer Accounts (BCA)End Level 4 Node: Bank Customer Accounts (BCA)
            Start Level 5 Node: AuthorizationsAuthorizationsEnd Level 5 Node: Authorizations
            Start Level 5 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 5 Node: Network and Communication Security
            Start Level 5 Node: Data Storage SecurityData Storage SecurityEnd Level 5 Node: Data Storage Security
            Start Level 5 Node: Important SAP NotesImportant SAP NotesEnd Level 5 Node: Important SAP Notes
         Start Level 4 Node: Loans Management (FS-CML)Loans Management (FS-CML)End Level 4 Node: Loans Management (FS-CML)
            Start Level 5 Node: AuthorizationsAuthorizationsEnd Level 5 Node: Authorizations
            Start Level 5 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 5 Node: Network and Communication Security
            Start Level 5 Node: Data Storage SecurityData Storage SecurityEnd Level 5 Node: Data Storage Security
         Start Level 4 Node: Collateral Management (CM)Collateral Management (CM)End Level 4 Node: Collateral Management (CM)
            Start Level 5 Node: AuthorizationsAuthorizationsEnd Level 5 Node: Authorizations
            Start Level 5 Node: Network Communication and SecurityNetwork Communication and SecurityEnd Level 5 Node: Network Communication and Security
         Start Level 4 Node: Strategic Enterprise Management (SEM) for BanksStrategic Enterprise Management (SEM) for BanksEnd Level 4 Node: Strategic Enterprise Management (SEM) for Banks
            Start Level 5 Node: AuthorizationsAuthorizationsEnd Level 5 Node: Authorizations
            Start Level 5 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 5 Node: Network and Communication Security
               Start Level 6 Node: Communication DestinationsCommunication DestinationsEnd Level 6 Node: Communication Destinations
            Start Level 5 Node: Data Storage SecurityData Storage SecurityEnd Level 5 Node: Data Storage Security
         Start Level 4 Node: Reserve for Bad Debt (FS-RBD)Reserve for Bad Debt (FS-RBD)End Level 4 Node: Reserve for Bad Debt (FS-RBD)
            Start Level 5 Node: AuthorizationsAuthorizationsEnd Level 5 Node: Authorizations
            Start Level 5 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 5 Node: Network and Communication Security
               Start Level 6 Node: Communication DestinationsCommunication DestinationsEnd Level 6 Node: Communication Destinations
            Start Level 5 Node: Trace and Log FilesTrace and Log FilesEnd Level 5 Node: Trace and Log Files
      Start Level 3 Node: Incentive and Commission Management (ICM)Incentive and Commission Management (ICM)End Level 3 Node: Incentive and Commission Management (ICM)
      Start Level 3 Node: Statutory Reporting for Insurance (FS-SR)Statutory Reporting for Insurance (FS-SR)End Level 3 Node: Statutory Reporting for Insurance (FS-SR)
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Data Storage SecurityData Storage SecurityEnd Level 4 Node: Data Storage Security
      Start Level 3 Node: Real Estate ManagementReal Estate ManagementEnd Level 3 Node: Real Estate Management
      Start Level 3 Node: Public Sector ManagementPublic Sector ManagementEnd Level 3 Node: Public Sector Management
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 4 Node: Network and Communication Security
         Start Level 4 Node: Data Storage SecurityData Storage SecurityEnd Level 4 Node: Data Storage Security
         Start Level 4 Node: More Security InformationMore Security InformationEnd Level 4 Node: More Security Information
   Start Level 2 Node: LogisticsLogisticsEnd Level 2 Node: Logistics
      Start Level 3 Node: Materials Management (MM)Materials Management (MM)End Level 3 Node: Materials Management (MM)
         Start Level 4 Node: Purchasing and Service Industries (MM-PUR, MM SRV)Purchasing and Service Industries (MM-PUR, MM SRV)End Level 4 Node: Purchasing and Service Industries (MM-PUR, MM SRV)
            Start Level 5 Node: AuthorizationsAuthorizationsEnd Level 5 Node: Authorizations
            Start Level 5 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 5 Node: Network and Communication Security
            Start Level 5 Node: Data Storage SecurityData Storage SecurityEnd Level 5 Node: Data Storage Security
         Start Level 4 Node: Inventory Management (MM-IM): AuthorizationsInventory Management (MM-IM): AuthorizationsEnd Level 4 Node: Inventory Management (MM-IM): Authorizations
         Start Level 4 Node: Logistics Invoice Verification (MM-IV): AuthorizationsLogistics Invoice Verification (MM-IV): AuthorizationsEnd Level 4 Node: Logistics Invoice Verification (MM-IV): Authorizations
      Start Level 3 Node: Product Lifecycle Management (PLM)Product Lifecycle Management (PLM)End Level 3 Node: Product Lifecycle Management (PLM)
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Communication DestinationsCommunication DestinationsEnd Level 4 Node: Communication Destinations
         Start Level 4 Node: Important SAP NotesImportant SAP NotesEnd Level 4 Node: Important SAP Notes
      Start Level 3 Node: ManufacturingManufacturingEnd Level 3 Node: Manufacturing
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Communication DestinationsCommunication DestinationsEnd Level 4 Node: Communication Destinations
      Start Level 3 Node: Logistics Execution (LE)Logistics Execution (LE)End Level 3 Node: Logistics Execution (LE)
         Start Level 4 Node: Dezentrale Lagerwirtschaft (LE-IDW), Shipping (LE-SHP), TransporDezentrale Lagerwirtschaft (LE-IDW), Shipping (LE-SHP), TransporEnd Level 4 Node: Dezentrale Lagerwirtschaft (LE-IDW), Shipping (LE-SHP), Transpor
            Start Level 5 Node: AuthorizationsAuthorizationsEnd Level 5 Node: Authorizations
            Start Level 5 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 5 Node: Network and Communication Security
         Start Level 4 Node: Warehouse Management System (LE-WMS)Warehouse Management System (LE-WMS)End Level 4 Node: Warehouse Management System (LE-WMS)
            Start Level 5 Node: AuthorizationsAuthorizationsEnd Level 5 Node: Authorizations
            Start Level 5 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 5 Node: Network and Communication Security
         Start Level 4 Node: Task and Resource Management (LE-TRM), Yard Management (LE-YM),Task and Resource Management (LE-TRM), Yard Management (LE-YM),End Level 4 Node: Task and Resource Management (LE-TRM), Yard Management (LE-YM),
            Start Level 5 Node: AuthorizationsAuthorizationsEnd Level 5 Node: Authorizations
            Start Level 5 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 5 Node: Network and Communication Security
      Start Level 3 Node: RetailRetailEnd Level 3 Node: Retail
         Start Level 4 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 4 Node: Network and Communication Security
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
      Start Level 3 Node: Global TradeGlobal TradeEnd Level 3 Node: Global Trade
         Start Level 4 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 4 Node: Network and Communication Security
      Start Level 3 Node: Sales and Distribution (SD)Sales and Distribution (SD)End Level 3 Node: Sales and Distribution (SD)
   Start Level 2 Node: Human Capital ManagementHuman Capital ManagementEnd Level 2 Node: Human Capital Management
      Start Level 3 Node: Personnel Management (PA)Personnel Management (PA)End Level 3 Node: Personnel Management (PA)
         Start Level 4 Node: Before You StartBefore You StartEnd Level 4 Node: Before You Start
         Start Level 4 Node: User ManagementUser ManagementEnd Level 4 Node: User Management
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Communication Channel SecurityCommunication Channel SecurityEnd Level 4 Node: Communication Channel Security
         Start Level 4 Node: Communication DestinationsCommunication DestinationsEnd Level 4 Node: Communication Destinations
         Start Level 4 Node: Data Storage SecurityData Storage SecurityEnd Level 4 Node: Data Storage Security
         Start Level 4 Node: Security for Additional ApplicationsSecurity for Additional ApplicationsEnd Level 4 Node: Security for Additional Applications
         Start Level 4 Node: Other Security-Relevant InformationOther Security-Relevant InformationEnd Level 4 Node: Other Security-Relevant Information
      Start Level 3 Node: Personnel Time Management (PT)Personnel Time Management (PT)End Level 3 Node: Personnel Time Management (PT)
         Start Level 4 Node: User ManagementUser ManagementEnd Level 4 Node: User Management
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Communication DestinationsCommunication DestinationsEnd Level 4 Node: Communication Destinations
      Start Level 3 Node: Payroll (PY)Payroll (PY)End Level 3 Node: Payroll (PY)
         Start Level 4 Node: Before You StartBefore You StartEnd Level 4 Node: Before You Start
         Start Level 4 Node: User ManagementUser ManagementEnd Level 4 Node: User Management
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Communication Channel SecurityCommunication Channel SecurityEnd Level 4 Node: Communication Channel Security
         Start Level 4 Node: Communication DestinationsCommunication DestinationsEnd Level 4 Node: Communication Destinations
         Start Level 4 Node: Data Storage SecurityData Storage SecurityEnd Level 4 Node: Data Storage Security
         Start Level 4 Node: Security for Additional ApplicationsSecurity for Additional ApplicationsEnd Level 4 Node: Security for Additional Applications
         Start Level 4 Node: Other Security-Relevant InformationOther Security-Relevant InformationEnd Level 4 Node: Other Security-Relevant Information
      Start Level 3 Node: SAP Learning SolutionSAP Learning SolutionEnd Level 3 Node: SAP Learning Solution
         Start Level 4 Node: Technical System LandscapeTechnical System LandscapeEnd Level 4 Node: Technical System Landscape
            Start Level 5 Node: PersistencePersistenceEnd Level 5 Node: Persistence
            Start Level 5 Node: Learning Portal (LSOFE)Learning Portal (LSOFE)End Level 5 Node: Learning Portal (LSOFE)
            Start Level 5 Node: Content Player (LSOCP)Content Player (LSOCP)End Level 5 Node: Content Player (LSOCP)
            Start Level 5 Node: Offline Player (LSOOP)Offline Player (LSOOP)End Level 5 Node: Offline Player (LSOOP)
            Start Level 5 Node: Authoring Environment (LSOAE)Authoring Environment (LSOAE)End Level 5 Node: Authoring Environment (LSOAE)
            Start Level 5 Node: Environment for the Training AdministratorEnvironment for the Training AdministratorEnd Level 5 Node: Environment for the Training Administrator
         Start Level 4 Node: User ManagementUser ManagementEnd Level 4 Node: User Management
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Communication Channel SecurityCommunication Channel SecurityEnd Level 4 Node: Communication Channel Security
         Start Level 4 Node: Other Security-Relevant InformationOther Security-Relevant InformationEnd Level 4 Node: Other Security-Relevant Information
      Start Level 3 Node: SAP E-RecruitingSAP E-RecruitingEnd Level 3 Node: SAP E-Recruiting
         Start Level 4 Node: Before You StartBefore You StartEnd Level 4 Node: Before You Start
         Start Level 4 Node: Technical System LandscapeTechnical System LandscapeEnd Level 4 Node: Technical System Landscape
         Start Level 4 Node: User ManagementUser ManagementEnd Level 4 Node: User Management
         Start Level 4 Node: AuthorizationsAuthorizationsEnd Level 4 Node: Authorizations
         Start Level 4 Node: Communication Channel SecurityCommunication Channel SecurityEnd Level 4 Node: Communication Channel Security
         Start Level 4 Node: Communication DestinationsCommunication DestinationsEnd Level 4 Node: Communication Destinations
         Start Level 4 Node: Data Storage SecurityData Storage SecurityEnd Level 4 Node: Data Storage Security
   Start Level 2 Node: Defense Forces & Public SecurityDefense Forces & Public SecurityEnd Level 2 Node: Defense Forces & Public Security
      Start Level 3 Node: Before You StartBefore You StartEnd Level 3 Node: Before You Start
      Start Level 3 Node: Technical System LandscapeTechnical System LandscapeEnd Level 3 Node: Technical System Landscape
      Start Level 3 Node: User Administration and AuthenticationUser Administration and AuthenticationEnd Level 3 Node: User Administration and Authentication
         Start Level 4 Node: User ManagementUser ManagementEnd Level 4 Node: User Management
      Start Level 3 Node: AuthorizationsAuthorizationsEnd Level 3 Node: Authorizations
      Start Level 3 Node: Network and Communication SecurityNetwork and Communication SecurityEnd Level 3 Node: Network and Communication Security
      Start Level 3 Node: Data Storage SecurityData Storage SecurityEnd Level 3 Node: Data Storage Security
   Start Level 2 Node: AppendixAppendixEnd Level 2 Node: Appendix