IBM Data and AI Ideas Portal for Customers


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea

Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.

Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.

Additional Information

To view our roadmaps: http://ibm.biz/Data-and-AI-Roadmaps

Reminder: This is not the place to submit defects or support needs, please use normal support channel for these cases

IBM Employees:

The correct URL for entering your ideas is: https://hybridcloudunit-internal.ideas.aha.io


ADD A NEW IDEA

FILTER BY CATEGORY

Security

Showing 77

Provide source IP connection information on db2diag.log for all cases of SQL30082N events

Db2 not always provide the source IP connection information on db2diag.log entries, where authentication failures happens - SQL30082NThis is a regular footprint on db2diag entries, when an authentication fails to connect to the database.2020-04-24...
over 1 year ago in Db2 / Security 0 Not under consideration

Add a way to pre-encrypt db2 user password before adding it in response file to do db2 silent install.

We are OEM customer to provider our user Db2+Cognos installation, we're using db2 silent install with a response file, for now, there is no way (no tools, no command) to encrypt a plain db2 user password so that we can add this encrypted password ...
over 1 year ago in Db2 / Security / Installation & Upgrade 0 Not under consideration

DB2 processes such as db2ckpwd and db2wdog run as root

The DB2 processes such as db2ckpwd and db2wdog run as root, which results in elevated system level access by those processes. Since root access is elevated system level access, a malicious user may gain access to other OS level APIs/processes and ...
over 1 year ago in Db2 / Security 1 Not under consideration

enable catalog database with SECURITY SSL in LDAP (MS active directory)

After enabling ssl for connections to db2 we want to register (catalog) database in Microsoft active directory (LDAP) to provide it to all user.But "db2 register db2 server in ldap as DATABASE protocol tcpip hostname hosta svcename 50005 SECURITY ...
over 1 year ago in Db2 / Application Development / Security 0 Not under consideration

Feature enhancement request for caching of password for LDAP plug-ins.

Currently Fiducia GAD is experiencing a bottleneck for the authenfication of DB2 connections against LDAP using the LDAP Plugin. This results in an overload of the LDAP server and in delays for creating new DB2 connections. Fiducia GAD need to cr...
almost 2 years ago in Db2 / Security 0 Delivered

Do not block DDL on RCAC-protected table if rule not affected by change

after alter add column RCAC rule must be dropped and recreated, even if new column is not part of rule IBM perspective: In our ALTER TABLE ADD COLUMN documentation it says: https://www.ibm.com/support/knowledgecenter/en/SSEPGG_11.5.0/com...
almost 2 years ago in Db2 / Security 0 Not under consideration

Store auditing information directly in a table ( this option does not require files )

Allow DB2 to configure auditing to store auditing information in a table. Information could be retrieved using SELECT commands and there is no need to use system procedures or utilities like db2audit to extract information from files. The purpose ...
almost 2 years ago in Db2 / Security 0 Not under consideration

Allow to switch off username conversion to lowercase

We are currently using Db2, SLES11, RACF/LDAP (zOS). Application users (personalized users, not system users) connecting to Db2 are defined in RACF/LDAP. Db2 user authentication and authorization is using Transparent LDAP, accessing RACF/LDAP....
almost 2 years ago in Db2 / Security 0 Not under consideration

Encrypted column support being deprecated, what else is available?

With DB2 LUW 11.1 the encrypt and decrypt, decrypt_char, decrypt_bin, etc functions are being deprecated. We already have all of the data encrypted on the disk with the disk subsystem so using an encrypted database does me no good. I need to b...
about 2 years ago in Db2 / Security 0 Not under consideration

Nickname using session_user

Nicknames ignores the permissions of the session_user, they just check the permissions of the connect user. In our Db2 Security System we connect with an CONNECT_USER to the database.After an successfull Connection the connect user does an SET...
over 2 years ago in Db2 / Federation / Security 3 Delivered