Critical Data Change configuration points
Critical Data Change can be configured through Configuration and Management and through external rules.
The
following table shows the configuration points for critical data change
processing. Each configuration point is discussed in more detail
in the related sections.
| Configuration Point | Mechanism |
|---|---|
| Configure Critical Data Change processing on or off | Configuration Manager |
| Customize which elements are processed as critical data | External Rules |
| Determine whether critical data been changed | External Rules |
| Bypass Critical Data Change processing | External Rules |
| Customize types of critical data changes allowed in a Critical Data Change request | External Rules |
| Determine which business objects have pending critical data changes | External Rules |
| Customize which business objects are not allowed real-time updates | External Rules |
| Customize which business objects to update when pending changes are accepted | External Rules |
| Customize how suspects are reidentified when pending changes are accepted | External Rules |