Skip to Main Content
IBM Data and AI Ideas Portal for Customers

Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea

Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.

Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.

Additional Information

To view our roadmaps:

Reminder: This is not the place to submit defects or support needs, please use normal support channel for these cases

IBM Employees:

The correct URL for entering your ideas is:




Showing 70

Allow unencrypted password in an SSL conversation

This is a request to align the behavior of DB2 LUW with that of IBM i and DB2 for z/OS when connecting with a DRDA client. With the other 2 platforms, if DRDA is configured to require user/password to be sent encrypted with minimum encryption leve...
over 4 years ago in Db2 / Security 0 Not under consideration

Master key rotation in HADR is not in transactional sequence even in SYNC mode

IN Encryption at rest - HADR scenario, master key rotation on primary is not getting shipped to standby immediately (relatively) in SYNC mode. Seems it needs explicit ARCHIVE LOG command to rotation key on standby.
over 4 years ago in Db2 / Security 0 Not under consideration

Trusted Context should be usable with static SQL

Trusted context or trusted connection is a security feature, which enables customers to differentiate between applications connecting to a database, based on whether they originate from a trusted or from a NON trusted client system.This works pret...
over 6 years ago in Db2 / Security 0 Not under consideration

mixed case sensitive support for db2 luw on linux platform

On linux and other Unices, connecting to db2 luw with users having capital letters into their user name is not possible since the db2 security components, I guess the standard OS security plugin, assume that usernames are all lower cases.This beha...
over 7 years ago in Db2 / Security 0 Not under consideration

DB2 Certificate Authentication with HSM Support

DB2 certificate authenticated TLS/JDBC connections should be configurable at the client via the standard "DriverManager.getConnection()" mechanism, where parameters are added to indicate that TLS client certificate authentication will be used. It ...
over 1 year ago in Db2 / Security 0 Future consideration

DB2 RCAC Masking usage enhancement

This is urgent request to enhance RCAC masking rule. We are using it on several systems but due to below limitation or bug we have to use static hardcoded values in the masking rule, which is lot of manual process and impose security risk. This fe...
about 2 years ago in Db2 / Security 0 Not under consideration

SSL support for two phase commit

We have seen errors hitting db2diag after enabling SSL and disabling the TCPIP port. These are related to DB2 not being able to handle Two Phase commit using just SSL port. Due to the new security mandate, the client requires all database connecti...
over 2 years ago in Db2 / Security 0 Not under consideration

DB2 processes such as db2ckpwd and db2wdog run as root

The DB2 processes such as db2ckpwd and db2wdog run as root, which results in elevated system level access by those processes. Since root access is elevated system level access, a malicious user may gain access to other OS level APIs/processes and ...
over 2 years ago in Db2 / Security 1 Not under consideration

CLONE_SERVER_HOST is the READ ONLY in db2 native encryption with KMIP

The CLONE_SERVER_HOST keysecure server defined in kmip cfg is the READ ONLY server which fails create encrypted database and SHOW MASTER KEY DETAILS commands. Also it is not 100% failover compatible.
over 4 years ago in Db2 / Security 0 Not under consideration

Database activation should carry separate security authority

ACTIVATE DATABASE should be a separate GRANTed authority.
about 5 years ago in Db2 / Security 0 Not under consideration