Skip to Content
Jun 17, 2020 at 05:14 PM

EWM Security


We are in the process of defining security / role design strategy for our EWM implementation. Does anyone know where I can find a complete list of tcodes typically considered when building business and IT roles and also if anyone would like to share their security design approach for their EWM implementation.