{"id":43480,"date":"2025-11-28T16:17:47","date_gmt":"2025-11-28T15:17:47","guid":{"rendered":"https:\/\/www.blue.works\/?p=43480"},"modified":"2026-03-16T09:09:31","modified_gmt":"2026-03-16T08:09:31","slug":"alm-coffeeparty-x-permissions-for-hybrid-transport-control","status":"publish","type":"post","link":"https:\/\/www.blue.works\/en\/alm-coffeeparty-x-permissions-for-hybrid-transport-control\/","title":{"rendered":"ALM Coffeeparty X &#8211; Permissions for hybrid transport control"},"content":{"rendered":"\n<p>There are many ways <a href=\"https:\/\/www.flickr.com\/photos\/46263214@N00\/2206711123\/\" target=\"_blank\" rel=\"noreferrer noopener\">to put your life at risk<\/a>.&nbsp;<\/p>\n\n\n\n<p>For example, you can <a href=\"https:\/\/www.flickr.com\/photos\/31110873@N07\/2914185727\/\" target=\"_blank\" rel=\"noreferrer noopener\">get in the way<\/a> of <a href=\"https:\/\/www.sotscheck.net\/\" target=\"_blank\" rel=\"noreferrer noopener\">the legendary Ireland correspondent<\/a> for the TAZ newspaper when the bell rings for last orders in the pub. Things get dicey when you break <a href=\"https:\/\/www.instagram.com\/reel\/C7mM1I4x15c\/?utm_source=ig_web_copy_link&amp;igsh=bDMzdGc3eDUwb2gx\" target=\"_blank\" rel=\"noreferrer noopener\">spaghetti for a carbonara<\/a> in Rome and then\u2014capital crime!\u2014pour cream into the sauce! It also gets very unpleasant when you demand the highest quality from a craftsman but <a href=\"https:\/\/rlv.zcache.com\/dont_tell_me_how_to_do_my_job_keyboard_door_sign-rbfdda4d99855431dbb3cd29ec245b166_6vj7r_644.webp?rlvnet=1\" target=\"_blank\" rel=\"noreferrer noopener\">refuse to let him use the tools of his choice<\/a>.&nbsp;<\/p>\n\n\n\n<p>In our SAP ABAP world, transport requests are the tool developers use to record their work so that it can be sent to the production system. Preventing them from creating these transports themselves always generates a tsunami of protests. But that is exactly what we have to do in order to have a stringent transport workflow.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The time before ChaRM&nbsp;<\/h2>\n\n\n\n<p>In the ancient days of R\/3 development, it was the task of the authorized project leader to create transport requests and then set up a task for each developer. When the developers had finished, they signaled this by releasing the task assigned to them. Once all tasks had been released, the project management could finally release the transport itself, which started the kernel programs tp and R3trans, which <a href=\"https:\/\/www.blue.works\/en\/alm-coffee-party-vi-charm-dos-and-donts\/\" target=\"_blank\" rel=\"noreferrer noopener\">controlled by the transport objects read the database and wrote it to an archive file on disk<\/a>.&nbsp;<\/p>\n\n\n\n<p>However, this division of labor did not withstand the onslaught of developers, and pretty soon all developers and customizers were given the authority to create and approve transports themselves.&nbsp;<\/p>\n\n\n\n<p>This was a paradise of freedom for development, and it was a chaotic hell for administrators and CCOE managers.&nbsp;<\/p>\n\n\n\n<p>Not only were hundreds of transports lying around in the development system, with no one knowing what they were supposed to do &#8211; I have assisted more than once in rebuilding a completely botched development system out of a database copy of the QA system. Not only were hundreds of transports lying around in the import queues of the downstream systems, with no one knowing who had sent them to production, when, why, and why they had been left there.&nbsp;<\/p>\n\n\n\n<p>Because now highly paid auditors came into the company, opened the import history of the production system, and with rhabdomantic certainty pointed their tiny fingers at a transport and asked the simple question of who had approved this change, who from the business had tested it and released it for production, and who had imported it into production: Lo and behold, it was a sensitive FI transport. The auditors are delighted with their hit: a finding! The application development management, however, turns pale: the audit certificate is at risk, and a career setback looms.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Realm of ChaRM&nbsp;<\/h2>\n\n\n\n<p>After an interregnum of folders full of printed and signed forms, which nobody could find anything in quickly, but which at least appeased the auditors, according to the motto: the main thing is that they get a lot of paper in their hands, <a href=\"https:\/\/www.blue.works\/en\/alm-kaffekranzchen-iii-charm-warum-weshalb-wieso-teil-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">ChaRM was introduced in SAP Solution Manager at the beginning of 2005<\/a>.&nbsp;<\/p>\n\n\n\n<p>ChaRM now took over the role of project management for the creation and approval of transports. Only the activity of approving the respective transport tasks and thus signaling the end of development to the new electronic project manager remained with development.&nbsp;<\/p>\n\n\n\n<p>But what a discussion! Because in a source system managed by ChaRM, you can no longer create transport requests using the ancient <a href=\"https:\/\/help.sap.com\/docs\/ABAP_PLATFORM_NEW\/4a368c163b08418890a406d413933ba7\/5738e1754eb711d182bf0000e829fbfe.html?version=201809.002\" target=\"_blank\" rel=\"noreferrer noopener\">Transport Organizer transactions SE09\/SE10<\/a>, even though you would have had the authorization to do so since time immemorial.&nbsp;<\/p>\n\n\n\n<p>Now, the transport attribute SAP_CTS_PROJECT for the work client forces you to specify such a CTS project when creating a transport request, and at the same time, the evil, deceitful ChaRM administrator ensures that the project switches for creating, releasing, and importing transports are always closed, preventing you from transporting data bypassing ChaRM.&nbsp;<\/p>\n\n\n\n<p>Every ChaRM novice grumble and complains and denounces this requirement as an obstacle to their work. Well, as a ChaRM implementer and responsible person, you learn to be <a href=\"https:\/\/thumbs.dreamstime.com\/b\/ritter-der-vom-drachefeuer-verteidigt-sich-ziehen-eines-gepanzerten-ritters-mithilfe-schutzschild-das-von-einem-drachefeuerspucken-201904922.jpg\" target=\"_blank\" rel=\"noreferrer noopener\">patient but obdurate<\/a>.&nbsp;<\/p>\n\n\n\n<p>Of course: Internally, ChaRM opens the project switches when transport-related status changes occur, executes the respective transport action, and quickly closes the switches again. Sometimes this open-close mechanism gets tangled up when these actions overlap with multiple users working almost simultaneously, but most of the time it works fine.&nbsp;<\/p>\n\n\n\n<p>Unfortunately, word has gotten around about how easy it is to manipulate these project switches. In general, those responsible at the CCOE are content to use the method described in SAP Note <a href=\"https:\/\/me.sap.com\/notes\/2207598\/E\" target=\"_blank\" rel=\"noreferrer noopener\">2207598 \u201cWhat log shows the user who changed CTS Project Status Switch setting for a ChaRM project? &#8211; Solution Manager,\u201d<\/a> to find out who did it this time and then give them a stern talking-to. But \u2013 to paraphrase Hegel \u2013 Saint Anthony of Padua achieved more than he preached to the fish.&nbsp;<\/p>\n\n\n\n<p>Strangely enough, no one has been able to bring themselves to reform the authorization roles. Experience has shown that such a change is tantamount to a Herculean task.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1280\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC05-1.jpg\" alt=\"\" class=\"wp-image-45817\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC05-1.jpg 1920w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC05-1-150x100.jpg 150w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC05-1-768x512.jpg 768w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC05-1-1536x1024.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><figcaption class=\"wp-element-caption\">&#8220;Herkules b\u00e4ndigt den minoischen Stier&#8221;, Statue an der Orangerie am Schloss &#8211; Schwerin, 26.2.2012<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The Post-ChaRM Era<\/h2>\n\n\n\n<p>The mighty ChaRM (and its fair-weather Sunday version, Focused Build) now has a young successor in Cloud ALM, the Feature.&nbsp;<\/p>\n\n\n\n<p>Since the feature no longer supports CTS projects, you must remove the constraint for setting the SAP_CTS_PROJECT attribute in the ABAP development system, thereby reopening the door to the warming old arbitrariness and cold chaos.&nbsp;<\/p>\n\n\n\n<p>Previously, in my \u201c<a href=\"https:\/\/www.blue.works\/en\/cloud-alm-coffeeparty-viii\/\" target=\"_blank\" rel=\"noreferrer noopener\">ALM Coffee Party VIII<\/a>,\u201d I recommended creating transports in the ABAP system and then assigning them to the Feature due to the error-proneness associated with the transport creation. This avoids the confusion that arises when, due to incorrect \u201cOwner\u201d information, transports are created under the system user who performs the synchronization jobs.&nbsp;<\/p>\n\n\n\n<p>Meanwhile, there has been a slight improvement. The ominous \u201cOwner\u201d input field is now a mandatory field, but the content is still not checked.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"387\" height=\"495\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC06-1.jpg\" alt=\"\" class=\"wp-image-45818\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC06-1.jpg 387w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC06-1-78x100.jpg 78w\" sizes=\"(max-width: 387px) 100vw, 387px\" \/><\/figure>\n\n\n\n<p>As long as the feature does not offer any input help for the \u201cowner\u201d and allows any selection of the \u201ctarget,\u201d we find ourselves in a dilemma!&nbsp;<\/p>\n\n\n\n<p>If you prefer to avoid the error-prone creation of the transport from within the feature, you should, as suggested previously, create transports in the system and then assign them to the feature. The transports are thus automatically assigned to the correct user and target the correct system. However, there is a certain risk that chaos will ensue.&nbsp;<\/p>\n\n\n\n<p>If, on the other hand, you want to avoid the chaos that arises when everyone is allowed to create transports, as we have learned from many years of painful experience, you must force the creation of transports from the feature and accept the current susceptibility to errors.&nbsp;<\/p>\n\n\n\n<p>However, this dilemma is only temporary, as SAP will close the gaps in transport creation in the feature in the course of 2026, and then you can enforce the creation and release of transports only from within the feature without any risk.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tuning of Authorization Roles&nbsp;<\/h2>\n\n\n\n<p>You could now set the transport attribute CALM_CDM_FEATURE_ID, which was introduced with note <a href=\"https:\/\/me.sap.com\/notes\/3322679\/E\" target=\"_blank\" rel=\"noreferrer noopener\">3322679 \u201cSAP Cloud ALM &#8211; CDM: Master Note up to ST-PI SP 24\u201d<\/a> to mandatory for the work client:\u00a0\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1118\" height=\"927\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC09-1.jpg\" alt=\"\" class=\"wp-image-45820\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC09-1.jpg 1118w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC09-1-121x100.jpg 121w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC09-1-768x637.jpg 768w\" sizes=\"(max-width: 1118px) 100vw, 1118px\" \/><\/figure>\n\n\n\n<p>You can still create a transport, but you can no longer release it:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1899\" height=\"865\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC10-1.jpg\" alt=\"\" class=\"wp-image-45821\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC10-1.jpg 1899w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC10-1-220x100.jpg 220w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC10-1-768x350.jpg 768w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC10-1-1536x700.jpg 1536w\" sizes=\"(max-width: 1899px) 100vw, 1899px\" \/><\/figure>\n\n\n\n<p>However, the long text of the error message reveals how you can still cheat your way around the feature, because the flag \u201cAttribute assigned externally\u201d (see above) is not set:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1344\" height=\"1145\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC11-1.jpg\" alt=\"\" class=\"wp-image-45822\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC11-1.jpg 1344w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC11-1-117x100.jpg 117w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC11-1-768x654.jpg 768w\" sizes=\"(max-width: 1344px) 100vw, 1344px\" \/><\/figure>\n\n\n\n<p>(Wunderwuzzi = Whizz-Kid)&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1154\" height=\"674\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC12-1.jpg\" alt=\"\" class=\"wp-image-45823\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC12-1.jpg 1154w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC12-1-171x100.jpg 171w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC12-1-768x449.jpg 768w\" sizes=\"(max-width: 1154px) 100vw, 1154px\" \/><\/figure>\n\n\n\n<p>Thus, regardless of whether you decide to enforce the feature now or prefer to wait until the gaps are closed, you will definitely have to adjust the authorization roles.&nbsp;<\/p>\n\n\n\n<p>The two authorization objects that control the creation and release of transports are S_TRANSPRT and S_SYS_RWBO, which also allows fine control for individual systems.&nbsp;<\/p>\n\n\n\n<p>Since S_SYS_RWBO offers exactly the same values for the ACTVT and TTYPE fields, I will focus here on the S_TRANSPRT object, but be careful! If S_TRANSPRT only allows display (ACTVT=03), the system additionally checks S_SYS_RWBO to see whether an action is permitted for the respective system after all. This means that you always have to maintain both.&nbsp;<\/p>\n\n\n\n<p>First, you have to use transaction SUIM to search for all roles that have S_TRANSPRT with ACTVT=01 \u201cCreate\u201d or =43 \u201cRelease.\u201d To restrict the results list to the roles that are actually used, you can display the extended selection options, which are rarely used:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1010\" height=\"212\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC02-1.jpg\" alt=\"\" class=\"wp-image-45824\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC02-1.jpg 1010w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC02-1-476x100.jpg 476w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC02-1-768x161.jpg 768w\" sizes=\"(max-width: 1010px) 100vw, 1010px\" \/><\/figure>\n\n\n\n<p>And voil\u00e0!&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"1663\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC03-1.jpg\" alt=\"\" class=\"wp-image-45825\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC03-1.jpg 800w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC03-1-48x100.jpg 48w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC03-1-768x1596.jpg 768w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC03-1-739x1536.jpg 739w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Role namespace: We want to see all roles&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>We only want to see single roles, because that&#8217;s what we&#8217;re interested in&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>Here, you should enter suitable users who actually have the team role of developer\/customizer&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li>DTRA=Workbench, CUST=Customizing&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"5\" class=\"wp-block-list\">\n<li>01=Creation, 43=Release&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>The result on our sandbox system:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1733\" height=\"529\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC04-1.jpg\" alt=\"\" class=\"wp-image-45828\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC04-1.jpg 1733w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC04-1-328x100.jpg 328w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC04-1-768x234.jpg 768w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC04-1-1536x469.jpg 1536w\" sizes=\"(max-width: 1733px) 100vw, 1733px\" \/><\/figure>\n\n\n\n<p>Some descriptions of the actions in the PFCG value help are confusing. For example, who would guess that ACTVT=75 \u201cRemove\u201d means that you can release another user&#8217;s transport? A complementary explanation of the possible values for the actions can be found <a href=\"https:\/\/help.sap.com\/docs\/ABAP_PLATFORM_NEW\/4a368c163b08418890a406d413933ba7\/520e5ed7c03311d2851c0000e8a57770.html\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Proposal&nbsp;<\/h2>\n\n\n\n<p>For Workbench and Customizing transports, I would suggest these authorizations:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1824\" height=\"1126\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC07-1.jpg\" alt=\"\" class=\"wp-image-45826\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC07-1.jpg 1824w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC07-1-162x100.jpg 162w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC07-1-768x474.jpg 768w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC07-1-1536x948.jpg 1536w\" sizes=\"(max-width: 1824px) 100vw, 1824px\" \/><\/figure>\n\n\n\n<p>You can see that I would not allow deletion \u2013 because as of today (October 2025), Cloud ALM does not notice when transports have been deleted. And unfortunately, you cannot remove transports from the replication list in Cloud ALM.&nbsp;<\/p>\n\n\n\n<p>You need more freedom for transport tasks (TTYPE=TASK), for which I would suggest the following permissions:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"680\" height=\"1043\" src=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC08-1.jpg\" alt=\"\" class=\"wp-image-45827\" srcset=\"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC08-1.jpg 680w, https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/PIC08-1-65x100.jpg 65w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/figure>\n\n\n\n<p>Transport of Copies (ToCs) (TTYPE=TRAN) can be generated from the Feature. Normally, no on-premise authorizations would be necessary here.&nbsp;<\/p>\n\n\n\n<p>However, experience shows that for large transports that take a long time to import into the QA system, it is often better to transport only the changed transport tasks to the QA system via ToC.&nbsp;<\/p>\n\n\n\n<p>Since Cloud ALM does not support such delta transports, the same authorizations for tasks could also be assigned for handling ToCs.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/youtu.be\/rUVEFkjqiEE?t=14\" target=\"_blank\" rel=\"noreferrer noopener\">With a Little Help From My Friends<\/a>&nbsp;<\/h2>\n\n\n\n<p>Below are some very interesting improvement requests that address urgently needed but still missing capabilities. If you are interested, please vote for them. A valid S-number is required for this.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/influence.sap.com\/sap\/ino\/#\/idea\/358402\/?section=sectionDetails\" target=\"_blank\" rel=\"noreferrer noopener\">CALM: Feature Status Change Action Shall Trigger Transport Actions<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/influence.sap.com\/sap\/ino\/#\/idea\/353714\/\" target=\"_blank\" rel=\"noreferrer noopener\">Features \/ Create Transport: Owner should be selected from a dropdown list (or F4 help)<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/influence.sap.com\/sap\/ino\/#\/idea\/358808\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fetching user-details from backend ABAP system when assigning owners to transports<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/influence.sap.com\/sap\/ino\/#\/idea\/344518\/\" target=\"_blank\" rel=\"noreferrer noopener\">Disable manual creation of transports once its configured with Cloud ALM<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/influence.sap.com\/sap\/ino\/#\/idea\/340661\" target=\"_blank\" rel=\"noreferrer noopener\">Using CTS-Project in managed sytems<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>And here is an improvement request that fits the topic, but was unfortunately rejected:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/influence.sap.com\/sap\/ino\/#\/idea\/318055\" target=\"_blank\" rel=\"noreferrer noopener\">Transport Control (via CTS Switches)<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For example, you can get in the way of the legendary Ireland correspondent for the TAZ newspaper when the bell rings for last orders in the pub. <\/p>\n","protected":false},"author":16,"featured_media":43478,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[351],"tags":[352],"class_list":["post-43480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alm-coffee-party-the-alm-magazine","tag-coffee-party"],"acf":[],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.blue.works\/wp-content\/uploads\/2025\/11\/image-39.png","_links":{"self":[{"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/posts\/43480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/comments?post=43480"}],"version-history":[{"count":6,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/posts\/43480\/revisions"}],"predecessor-version":[{"id":45829,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/posts\/43480\/revisions\/45829"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/media\/43478"}],"wp:attachment":[{"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/media?parent=43480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/categories?post=43480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blue.works\/en\/wp-json\/wp\/v2\/tags?post=43480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}