Technology Blogs by SAP
Learn how to extend and personalize SAP applications. Follow the SAP technology blog for insights into SAP BTP, ABAP, SAP Analytics Cloud, SAP HANA, and more.
cancel
Showing results for 
Search instead for 
Did you mean: 
Layth_Harzalli
Advisor
Advisor
0 Kudos
450

Securing access to the Central Management Console (CMC) is an important step in protecting your SAP BusinessObjects BI platform. In this guide, we'll walk through the process of adding password protection to the CMC using Tomcat.

 

Step-by-Step Guide :

 

  1. Stop the Tomcat server
  2. Backup configuration files

   - Navigate to <Tomcat Installed Dir>\webapps\BOE\WEB-INF and backup the `web.xml` file

   - Go to <Tomcat Installed Dir>\conf  and backup tomcat-users.xml

 

      3. Modify web.xml

    - Open `web.xml` and add the following security constraint:

  

 

 

 <security-constraint>

     <web-resource-collection>

       <web-resource-name>CMC</web-resource-name>

       <url-pattern>/CMC/*</url-pattern>

     </web-resource-collection>

     <auth-constraint>

       <role-name>CMCAdmin</role-name>

     </auth-constraint>

   </security-constraint>



   <login-config>

     <auth-method>BASIC</auth-method>

     <realm-name>CMC Access</realm-name>

   </login-config>



   <security-role>

     <description>Role required to access CMC</description>

     <role-name>CMCAdmin</role-name>

   </security-role>

 

 

  

        4.Update tomcat-users.xml

     - Open `tomcat-users.xml` and add the following lines within the <tomcat-users> tag:

   

 

 

<role rolename="CMCAdmin"/>

   <user username="administrator" password="yourPassword" roles="CMCAdmin"/>

 

     5.Restart Tomcat

     6.Clear browser cache and cookies

     7.Access the CMC

   - URL: http://host:port/BOE/CMC

   - Use the credentials:

     - Username: administrator

     - Password: yourPassword (as set in step 4)

Layth_Harzalli_0-1726578733830.png

 

 

By following these steps, you'll add an extra layer of security to your CMC, requiring users to authenticate before accessing this critical management interface.

Remember to choose a strong password and consider implementing additional security measures as needed for your specific environment.