Infrastructure

Note: Some infrastructure business objects exhibit special behaviour as follows:

A target system is created using transported data from the source system. In the source system a primary key can be updated. If this primary key is subsequently transported, it is added as a new business object rather than an update to the existing one on the target system. Therefore both the original primary key name and the updated primary key will be created in the target system.

The business objects that are affected by this behavior are: Security Role, Security Group, Security Identifiers, Code Table and Properties.