cancel
Showing results for 
Search instead for 
Did you mean: 

EWM Security

0 Kudos

We are in the process of defining security / role design strategy for our EWM implementation. Does anyone know where I can find a complete list of tcodes typically considered when building business and IT roles and also if anyone would like to share their security design approach for their EWM implementation.

Accepted Solutions (0)

Answers (2)

Answers (2)

schulte-bahrenberg
Contributor

Hi Jane,

SAP provides a couple pre-defined roles. You can find them by searching for /SCWM/* and inspire yourself by looking at the details.

Would suggest starting with those and/or copy to Z-versions and add/remove whatever does not fit.

Regards,

Hendrik

1.png

2.png

0 Kudos

Thanks for sharing this info, Hendrik!

former_member230160
Active Participant
0 Kudos

Hello Jane,

you would usually first check in your project what would be typical "roles" people have and which transactions/... they require to fullfill them. Based on this you could then create your concept.

If you take predefined roles or concepts that other companies have, you always have the issue that your users have either "too many" authorizations or "too little".

Best regards

Markus