on 06-17-2020 6:14 PM
We are in the process of defining security / role design strategy for our EWM implementation. Does anyone know where I can find a complete list of tcodes typically considered when building business and IT roles and also if anyone would like to share their security design approach for their EWM implementation.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hello Jane,
you would usually first check in your project what would be typical "roles" people have and which transactions/... they require to fullfill them. Based on this you could then create your concept.
If you take predefined roles or concepts that other companies have, you always have the issue that your users have either "too many" authorizations or "too little".
Best regards
Markus
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
13 | |
4 | |
3 | |
2 | |
1 | |
1 | |
1 | |
1 | |
1 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.