Skip to Main Content
IBM Data and AI Ideas Portal for Customers


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea

Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The product management team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.

Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.

Additional Information

To view our roadmaps: http://ibm.biz/Data-and-AI-Roadmaps

Reminder: This is not the place to submit defects or support needs, please use normal support channel for these cases

IBM Employees:

The correct URL for entering your ideas is: https://hybridcloudunit-internal.ideas.aha.io


ADD A NEW IDEA

FILTER BY CATEGORY

Security

Showing 70

Database activation should carry separate security authority

ACTIVATE DATABASE should be a separate GRANTed authority.
about 5 years ago in Db2 / Security 0 Not under consideration

DB2 CLI connect to remote database with encrypted password file

The DB2 CLI command line does not provide a way to use an encrypted credentials file to connect remote DB2 databases.The idea is to have a similar solution like the encryped password file for SQL/Q-Replication.The replication tool asnpwd can creat...
about 5 years ago in Db2 / Security 0 Not under consideration

DDL creation support thru implicit trusted connection

Trusted context is a very good security mecanism to promote a user from an application server to a specific role. We face 2 problems:- DDL issued from Siebel application server, when applying a change, fails for CREATE TABLE- If user has no direct...
about 5 years ago in Db2 / Security 0 Not under consideration

Import and AUTH_LIST* support for implicit trusted context connection

Trusted context is a very good security mecanism to promote a user from an application server to a specific role. We face 2 problems:- SADMIN needs to do IMPORT REPLACE actions that fail.l- we have no visilibilty from AUTH_LIST_AUTHORITIES_FOR_AUT...
over 5 years ago in Db2 / Security 0 Not under consideration

Marking range partitions in a table as readonly

Need feature at range-partition level granularity to mark it read-only so that no update/insert/delete can be performed on a particular range-partition. And by default (when not marked as readonly) all partitions carries table level permissions.Pe...
over 5 years ago in Db2 / Security 0 Not under consideration

Introduce similar to SYSPROC.AUDIT_DELIM_EXTRACT for extracting audit events directly to Syslog

Introduce similar to SYSPROC.AUDIT_DELIM_EXTRACT for extracting audit events directly to Syslog
over 5 years ago in Db2 / Security 1 Not under consideration

Grant 'create, drop and alter a tablespace' authority to specific user

The Sysctl group can create, drop and alter a tablespace in db2 and also have all authorities of SYSMAINT and SYSMON. Customer just want to give tablespace control authority to specific user.
over 5 years ago in Db2 / Security 0 Not under consideration

Security enhancement - support of roles for GRANT SETSESSIONUSER privilege

After the change of the security setup in DB2 database to a role based model there is still a part where some rights can only be granted to groups instead of roles. This forces admins to maintain to sets of security setups making a complex Task ev...
almost 6 years ago in Db2 / Security 0 Not under consideration

Performance degradation after enabling RCAC

Performance degradation and difference in behavior of access plan on stored procedure query after enabling RCAC - column masking for a column which is part of select condition. The query access plan without RCAC is scanning only the table (Table A...
almost 6 years ago in Db2 / Security 0 Not under consideration

Enable 2-Factor Authentication for Remote DB2 LUW Connections

Provide an option within DB2 LUW to require 2-factor authentication using a password composed of a personal PIN plus a token code, provided by a vendor such as RSA.
almost 6 years ago in Db2 / Security 0 Not under consideration