Skip to Content
0
Jun 17, 2020 at 05:14 PM

EWM Security

47 Views

We are in the process of defining security / role design strategy for our EWM implementation. Does anyone know where I can find a complete list of tcodes typically considered when building business and IT roles and also if anyone would like to share their security design approach for their EWM implementation.