Skip to Main Content
IBM Data Platform Ideas Portal for Customers


This portal is to open public enhancement requests against products and services offered by the IBM Data Platform organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:


Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,


Post your ideas

Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

IBM Employees should enter Ideas at https://ideas.ibm.com



Status Under review
Workspace Db2 for z/OS
Created by Guest
Created on Dec 16, 2025

DB2 - Correlation Identifier for RACF Access Checks Triggered by DB2 (FASTAUTH)

Description of Current Situation:
We recently migrated from Db2 internal authorization to RACF-based Db2 Security using RACF profiles.

Functional behavior is correct, but transparent and auditable reporting of Db2 access decisions is currently not possible. Using zSecure Access Monitor*, we can see RACF class/profile decisions, return codes, and user attributes that influenced an access.

However, when Db2 performs an authorization sequence — for example:

  • User attempts access to DBD0.IDAA_MGMT.SELECT → RACF return code 8 (expected denial)
  • Db2 then checks DBD0.SYSADM → RACF return code 0 (user has administrative privilege)

Both attempts are visible in Access Monitor.

The successful administrative authority check (RC=0), which actually grants access to the underlying Db2 object, is not reported in a way that allows us to correlate it with the failed check.

As at the same time a user tries to access another resource like DBD0.IDAAV2_MGMT.SELECT

This results in an audit gap: the resource owner sees a denied SELECT on the table, even though Db2 subsequently allows the read access via the SYSADM authority. This means administrative access to sensitive data is effectively 'unseen' in terms of relation of both access checks is not transparent.

Required Enhancement:
A Unique Correlation Identifier (Correlation ID) for Each Db2 Authorization Flow

A new optional parameter or context token that:

  • Is generated once per “authorization flow” initiated by Db2
  • Is passed to RACROUTE REQUEST=FASTAUTH
  • Is included in SMF Type 80 records and zSecure Access Monitor events
  • Is returned consistently across all RACHECK calls triggered within the same logical access chain

Business and Audit Justification:
The inability to correlate Db2 authorization flows results in:

  • Incomplete reporting of actual access decisions
  • “Invisible” administrative access to sensitive data
  • Incorrect perception of denied access when access was actually granted via SYSADM or similar privileges
  • A non-auditable gap where administrators’ read activities are not transparently tracked

Regulated environments (financial, insurance) require demonstrable, transparent, and correlated access reporting.

zSecure Access Monitor:
zSecure Access Monitor uses RACF post-processing exits to record access events. This is completely separate to any SMF records that RACF may write for auditing. Therefore any enhancement would also need to include the proposed correlation ID when those RACF post-processing exits are called so that Access Monitor can include them in the recorded access event records.

Needed By Week