Skip to Main Content
IBM Data and AI Ideas Portal for Customers


This portal is to open public enhancement requests against products and services offered by the IBM Data & AI organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:


Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,


Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

IBM Data & AI Roadmaps (http://ibm.biz/Data-and-AI-Roadmaps) - Use this site to view roadmaps for Data & AI products.

IBM Employees should enter Ideas at https://hybridcloudunit-internal.ideas.aha.io/


ADD A NEW IDEA

FILTER BY CATEGORY

Security

Showing 75

CLONE_SERVER_HOST is the READ ONLY in db2 native encryption with KMIP

The CLONE_SERVER_HOST keysecure server defined in kmip cfg is the READ ONLY server which fails create encrypted database and SHOW MASTER KEY DETAILS commands. Also it is not 100% failover compatible.
almost 5 years ago in Db2 / Security 0 Not under consideration

Restore with SHOW MASTER KEY DETAILS requires db entry in list db drirectory

To know master key details, SHOW MASTER KEY DETAILS require db entry in list db directory otherwise it creates new entry. To get the details from backup image on production system - requires prod db to be down which is not feasible.
almost 5 years ago in Db2 / Security 0 Not under consideration

Master key rotation in HADR is not in transactional sequence even in SYNC mode

IN Encryption at rest - HADR scenario, master key rotation on primary is not getting shipped to standby immediately (relatively) in SYNC mode. Seems it needs explicit ARCHIVE LOG command to rotation key on standby.
almost 5 years ago in Db2 / Security 0 Not under consideration

Need GSKTRACE tool to format binary GSKTRACE ouput ... similar to DB2 z/OS

We have enabled TLS on a db2 connect gateway SSL cipher specs (SSL_CIPHERSPECS) = TLS_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 SSL versions (SSL_VERSIONS...
about 5 years ago in Db2 / Security 0 Not under consideration

DB2 LUW - Enhance Trusted Context

We use Trusted Context (TC) to allow connections into a database from IP's configured. However with the move to the cloud, it has become a challenge as the source IP's change dynamically with application restart. We need a TC mechanism to be able ...
over 5 years ago in Db2 / Security 0 Not under consideration

Database activation should carry separate security authority

ACTIVATE DATABASE should be a separate GRANTed authority.
over 5 years ago in Db2 / Security 0 Not under consideration

DB2 CLI connect to remote database with encrypted password file

The DB2 CLI command line does not provide a way to use an encrypted credentials file to connect remote DB2 databases.The idea is to have a similar solution like the encryped password file for SQL/Q-Replication.The replication tool asnpwd can creat...
over 5 years ago in Db2 / Security 0 Not under consideration

DDL creation support thru implicit trusted connection

Trusted context is a very good security mecanism to promote a user from an application server to a specific role. We face 2 problems:- DDL issued from Siebel application server, when applying a change, fails for CREATE TABLE- If user has no direct...
over 5 years ago in Db2 / Security 0 Not under consideration

Import and AUTH_LIST* support for implicit trusted context connection

Trusted context is a very good security mecanism to promote a user from an application server to a specific role. We face 2 problems:- SADMIN needs to do IMPORT REPLACE actions that fail.l- we have no visilibilty from AUTH_LIST_AUTHORITIES_FOR_AUT...
over 5 years ago in Db2 / Security 0 Not under consideration

Marking range partitions in a table as readonly

Need feature at range-partition level granularity to mark it read-only so that no update/insert/delete can be performed on a particular range-partition. And by default (when not marked as readonly) all partitions carries table level permissions.Pe...
over 5 years ago in Db2 / Security 0 Not under consideration