Critical Data Change configuration points

Critical Data Change can be configured through Configuration and Management and through external rules.

The following table shows the configuration points for critical data change processing. Each configuration point is discussed in more detail in the related sections.
Table 1. Critical Data Change configuration points and where that action is configured
Configuration Point Mechanism
Configure Critical Data Change processing on or off Configuration Manager
Customize which elements are processed as critical data External Rules
Determine whether critical data been changed External Rules
Bypass Critical Data Change processing External Rules
Customize types of critical data changes allowed in a Critical Data Change request External Rules
Determine which business objects have pending critical data changes External Rules
Customize which business objects are not allowed real-time updates External Rules
Customize which business objects to update when pending changes are accepted External Rules
Customize how suspects are reidentified when pending changes are accepted External Rules