IBM Data and AI Ideas Portal for Customers


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea

Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.

Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.

Additional Information

To view our roadmaps: http://ibm.biz/Data-and-AI-Roadmaps

Reminder: This is not the place to submit defects or support needs, please use normal support channel for these cases

IBM Employees:

The correct URL for entering your ideas is: https://hybridcloudunit-internal.ideas.aha.io


ADD A NEW IDEA

FILTER BY CATEGORY

Security

Showing 77

Security enhancement - support of roles for GRANT SETSESSIONUSER privilege

After the change of the security setup in DB2 database to a role based model there is still a part where some rights can only be granted to groups instead of roles. This forces admins to maintain to sets of security setups making a complex Task ev...
almost 5 years ago in Db2 / Security 0 Not under consideration

Enable hostname validation in Db2 using TLS/SSL

When connecting to a Db2 database via TLS/SSL, the client must compare the hostname it used to open the connection against the server name in the server certificate. This is currently not an option in Db2. It's required to prevent man-in-the-midd...
over 3 years ago in Db2 / Security 0 Not under consideration

Introduce similar to SYSPROC.AUDIT_DELIM_EXTRACT for extracting audit events directly to Syslog

Introduce similar to SYSPROC.AUDIT_DELIM_EXTRACT for extracting audit events directly to Syslog
over 4 years ago in Db2 / Security 1 Not under consideration

Grant 'create, drop and alter a tablespace' authority to specific user

The Sysctl group can create, drop and alter a tablespace in db2 and also have all authorities of SYSMAINT and SYSMON. Customer just want to give tablespace control authority to specific user.
almost 5 years ago in Db2 / Security 0 Not under consideration

enable catalog database with SECURITY SSL in LDAP (MS active directory)

After enabling ssl for connections to db2 we want to register (catalog) database in Microsoft active directory (LDAP) to provide it to all user.But "db2 register db2 server in ldap as DATABASE protocol tcpip hostname hosta svcename 50005 SECURITY ...
over 1 year ago in Db2 / Application Development / Security 0 Not under consideration

Allow to switch off username conversion to lowercase

We are currently using Db2, SLES11, RACF/LDAP (zOS). Application users (personalized users, not system users) connecting to Db2 are defined in RACF/LDAP. Db2 user authentication and authorization is using Transparent LDAP, accessing RACF/LDAP....
almost 2 years ago in Db2 / Security 0 Not under consideration

Provide source IP connection information on db2diag.log for all cases of SQL30082N events

Db2 not always provide the source IP connection information on db2diag.log entries, where authentication failures happens - SQL30082NThis is a regular footprint on db2diag entries, when an authentication fails to connect to the database.2020-04-24...
over 1 year ago in Db2 / Security 0 Not under consideration

DB2 LUW - Enhance Trusted Context

We use Trusted Context (TC) to allow connections into a database from IP's configured. However with the move to the cloud, it has become a challenge as the source IP's change dynamically with application restart. We need a TC mechanism to be able ...
about 4 years ago in Db2 / Security 0 Not under consideration

Online db encryption at rest

To implement encryption at rest - we have to do backup - restore i.e. outage to application. OUtage can only be avoided in case of HADR setup which is not always the case. This RFE is to bring feature of online db encryption without any outage to ...
almost 3 years ago in Db2 / Security 0 Not under consideration

Add a new security role to read the logs

Add a new security privileges to allow and restrict the log reads and history file.
over 6 years ago in Db2 / Security 0 Not under consideration