We are in the process of defining security / role design strategy for our EWM implementation. Does anyone know where I can find a complete list of tcodes typically considered when building business and IT roles and also if anyone would like to share their security design approach for their EWM implementation.