Skip to Main Content
IBM Data and AI Ideas Portal for Customers


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea

Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.

Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.

Additional Information

To view our roadmaps: http://ibm.biz/Data-and-AI-Roadmaps

Reminder: This is not the place to submit defects or support needs, please use normal support channel for these cases

IBM Employees:

The correct URL for entering your ideas is: https://hybridcloudunit-internal.ideas.aha.io


ADD A NEW IDEA

FILTER BY CATEGORY

Security

Showing 70

Single source for User access details

The SYSIBMADM.PRIVILEGES view should be enhanced to include all privileges that a user has on the database. currently it reports most of them but does not include data about a user's access on Columns & SurrogateIDs . i.e from syscat.colauth &...
over 3 years ago in Db2 / Security 1 Not under consideration

Oracel "select any table" feature in DB2

Customer need a read only user to do the extract in the data warehouse project or to do the monitor. With the 'select any table' privilege , after customer create some new table,that user only have the read only privilege on those new tables.
over 3 years ago in Db2 / Security 1 Functionality already exists

Temporal Table extension for Auditing and Interface Design

Add functionality to allow the use of temporal tables for auditing purposes by adding functionality like in Db2 for z/OS: - A column GENERATED ALWAYS AS (DATA CHANGE OPERATION)- ON DELTE ADD EXTRA ROW functionality to record who deleted a rowIn co...
over 3 years ago in Db2 / Security 0 Not under consideration

Online db encryption at rest

To implement encryption at rest - we have to do backup - restore i.e. outage to application. OUtage can only be avoided in case of HADR setup which is not always the case. This RFE is to bring feature of online db encryption without any outage to ...
over 3 years ago in Db2 / Security 0 Not under consideration

Db2 client authentication with certificates like SSH (public/private) keys

Provide the possibility to authenticate with public/private certificates for the current client user like SSH does
almost 4 years ago in Db2 / Security 2 Not under consideration

Create a new role SECADM_RCAC with limited privileges related to RCAC activities.

We would like a new role to be created (SECADM_RCAC) to allow a designated RCAC admin to administer RCAC rules.
about 4 years ago in Db2 / Security 0 Not under consideration

load privilages should not affect runstants

RS should not require load authority Authorization For a table, you require one of the following authorities: •SYSADM•SYSCTRL•SYSMAINT•DBADM•SQLADM•CONTROL privilege on the table•LOAD authority
about 4 years ago in Db2 / Security 0 Not under consideration

Provide support in Db2 native encryption for KMIP 1.2 or higher

DB2 native encryption currently supports KMIP 1.1 where the master key flows (in a secure communication channel) from the centralized keystore to Db2 in order to decrypt the data encryption key. Later versions of KMIP support an alternate approach...
about 4 years ago in Db2 / Security 0 Not under consideration

Provide certificate based authentication

We'd like to see certificate based authentication being offered for DB2 LUW and DSM.
about 4 years ago in Db2 / Security 0 Not under consideration

SSL Password authentication with KMIP protocol

KMIP 1.1 does not support CN+password authentication in SSL connectivity with KEYSECURE. As of now ONLY CN (hostname) is handshanked to established connectivity with KEYSECURE.
about 4 years ago in Db2 / Security 0 Not under consideration