Skip to Main Content
IBM Data and AI Ideas Portal for Customers


This portal is to open public enhancement requests against products and services offered by the IBM Data & AI organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:


Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,


Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

IBM Employees should enter Ideas at https://ideas.ibm.com


ADD A NEW IDEA

Security

Showing 9

Remove Group Based Access Limitation

Description of Limitation: IBM has defined a few limitations with role based access which include the following: A role cannot own database objects. Permissions and roles granted to groups are not considered when you create the following database ...
over 1 year ago in Db2 / Security 2 Future consideration

Add a new security role to read the logs

Add a new security privileges to allow and restrict the log reads and history file.
about 9 years ago in Db2 / Security 0 Future consideration

Create new SQL-VIEW to show ALL GRANTS

Today we have a useful sql-view named SYSIBMADM.PRIVILEGES that aggregates in a consistent and easy way to query all different types of privileges that are currently granted to an authid. This is very useful. But we lack some other stuff like info...
10 months ago in Db2 / Security 0 Future consideration

schema-privilege for USAGE ON SEQUENCE

To GRANT USAGE ON SEQUENCE there is only the old method with db2 grant usage on sequence sq_test to role <rolename> But i want to use schema-privileges, but there is not the function GRANT USAGEIN ON SCHEMA MYSCHEMA TO ROLE <rolename> ...
almost 3 years ago in Db2 / Security 0 Future consideration

DB2 Certificate Authentication with HSM Support

DB2 certificate authenticated TLS/JDBC connections should be configurable at the client via the standard "DriverManager.getConnection()" mechanism, where parameters are added to indicate that TLS client certificate authentication will be used. It ...
about 3 years ago in Db2 / Security 0 Future consideration

Create a new authentication plugin for handling OAuth/OpenID protocol

The customer currently uses Kerberos but indents to move to OAuth/OpenID after upgrading from db2 V11.1 to V11.5 or V12
9 months ago in Db2 / Security 0 Future consideration

DB2 LUW : Trusted contexts over IPC

There are many applications where application and DB is co-located in the same server. User impersonation via trusted contexts helps control the access of the database for individual users even though a common technical ID is seeded in application...
over 1 year ago in Db2 / Security 1 Future consideration

Restrict access of non system data by instance owner

We manage many database systems however as a service provider we do not want the ability to access customer data unless a customer enables this access to us. This should be set at the time of database creation and should not be something that can ...
almost 3 years ago in Db2 / Security 0 Future consideration

Revoke on function blocked by depended objects.

The revoke on a function is being blocked due to dependent on the target object. revoke EXECUTE ON FUNCTION "xyz"."aaaaaa"(DATE) from PUBLIC SQL0478N The statement failed because one or more dependencies exist on the target object. Target object t...
about 3 years ago in Db2 / Security 0 Future consideration