I took a look at your case, and I think getting the debug logs like the TSE requested are the best next steps. Those should help figure out which user Windchill thinks is modifying/owning the EPMCheckpoint object.
↧
I took a look at your case, and I think getting the debug logs like the TSE requested are the best next steps. Those should help figure out which user Windchill thinks is modifying/owning the EPMCheckpoint object.