Skip to Main Content
IBM Data and AI Ideas Portal for Customers


This portal is to open public enhancement requests against products and services offered by the IBM Data & AI organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:


Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,


Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

IBM Employees should enter Ideas at https://ideas.ibm.com


ADD A NEW IDEA

My votes: Security

Showing 77 of 15496

Key rotation of DEK

Facility to rotate DEK in addition to rotation of DMK. Currently db2 does support master key rotation however for banking regulations there is need of facility to rotate the DEK as well.
over 6 years ago in Db2 / Security 0 Not under consideration

Allow unencrypted password in an SSL conversation

This is a request to align the behavior of DB2 LUW with that of IBM i and DB2 for z/OS when connecting with a DRDA client. With the other 2 platforms, if DRDA is configured to require user/password to be sent encrypted with minimum encryption leve...
almost 7 years ago in Db2 / Security 0 Not under consideration

Master key rotation in HADR is not in transactional sequence even in SYNC mode

IN Encryption at rest - HADR scenario, master key rotation on primary is not getting shipped to standby immediately (relatively) in SYNC mode. Seems it needs explicit ARCHIVE LOG command to rotation key on standby.
almost 7 years ago in Db2 / Security 0 Not under consideration

DB2 processes such as db2ckpwd and db2wdog run as root

The DB2 processes such as db2ckpwd and db2wdog run as root, which results in elevated system level access by those processes. Since root access is elevated system level access, a malicious user may gain access to other OS level APIs/processes and ...
over 4 years ago in Db2 / Security 1 Not under consideration

Allow IBM Data Server Runtime Client ODBC to connect with TLS signer certifcate to DB2 Server

DB2 ODBC client connect will not send a TLS signer certificate to DB2 server unless the client keystore DB has a default certificate. I had to set the cert as the default certificated in the my local keystore db >gsk8capicmd -cert -setdefault ...
over 5 years ago in Db2 / Security 2 Not under consideration

Trusted Context should be usable with static SQL

Trusted context or trusted connection is a security feature, which enables customers to differentiate between applications connecting to a database, based on whether they originate from a trusted or from a NON trusted client system.This works pret...
about 9 years ago in Db2 / Security 1 Planned for future release

mixed case sensitive support for db2 luw on linux platform

On linux and other Unices, connecting to db2 luw with users having capital letters into their user name is not possible since the db2 security components, I guess the standard OS security plugin, assume that usernames are all lower cases.This beha...
over 9 years ago in Db2 / Security 0 Not under consideration

CLONE_SERVER_HOST is the READ ONLY in db2 native encryption with KMIP

The CLONE_SERVER_HOST keysecure server defined in kmip cfg is the READ ONLY server which fails create encrypted database and SHOW MASTER KEY DETAILS commands. Also it is not 100% failover compatible.
almost 7 years ago in Db2 / Security 0 Not under consideration

Revoke on function blocked by depended objects.

The revoke on a function is being blocked due to dependent on the target object. revoke EXECUTE ON FUNCTION "xyz"."aaaaaa"(DATE) from PUBLIC SQL0478N The statement failed because one or more dependencies exist on the target object. Target object t...
over 3 years ago in Db2 / Security 0 Future consideration

Database activation should carry separate security authority

ACTIVATE DATABASE should be a separate GRANTed authority.
over 7 years ago in Db2 / Security 0 Not under consideration