We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Db2 for z/OS customers are using multilevel security for business needs and regulatory reasons. https://www.ibm.com/docs/en/db2-for-zos/12?topic=granularity-creating-tables-multilevel-securityIf a table is defined with a AS SECURITY LABEL, this ta...
Monitor the progress while binary image upload is running
During image upload from a local machine to target volume it takes some time depends on the network setup and local/remote connection. The amount of time it takes for the above is dependent upon how long it takes to transfer from laptop to the IDA...
Allow specification of Authid under which Federated Tables References are created
DBAs in our organisation gain SYSADM authority via a secondary authid (a RACF Group), and it is that authority that we expect to use when administering the IDAA. However when using internal Db2 security the Create Rference stored procedure to crea...
Track changes to the JSON file that is uploaded to the IDAA
We are required to document and track all changes to key baseline parameters, all maintenance levels for all software products in our shop, and to identify when parameters change (drift) from the baseline values. The capture, discovery, and repor...
V7 - Truncate VARCHAR columns larger than 32592 allowing loads/replication
V5 allowed loads/replication of tables having a VARCHAR column larger than 32592. V7 does not. Our company has several tables that are loaded/replicated to the V5 appliance that now cannot be. The tables can not be changed because they are par...
messages on virtual console indicating shutdown in progress
Having an indication that the IDAA is shutting down and then "shutdown completed" would aid operations personnel figure out status of the IDAA during shutdown or system relocation activities triggered by automation (GDPS) etc.
Provide greater flexibility for secure separation of duties within IDAA.Currently there is 1 ID with 1 Password which translated into 1 key to every door within IDAA. This scenario simply does not comply with Audit especially for a financial inst...
Monitor IDAA for z/OS physical filesystem in size in real time
There are different UIs such as Data Studio, DSM and and Admin UI and they provide different metrics for storage usage in IDAA on Z. Such as; - Table size in data studio determined at the table level, - Used Space in data studio which comes fro...
IDAA Externalized Password Management for Management Console
Externalized Password Management for Management Console Problem Statement:IDAA admin console does not comply with current audit requirementsThe Admin console is administered using an admin account with a non-expiring password that is not vaultedAd...
Do not place IBM confidential, company confidential, or personal information into any field.