Skip to Main Content
Integration


This is an IBM Automation portal for Integration products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.


ADD A NEW IDEA

My ideas

Showing 2863 of 2863

Positive authorisation events

Today, Authority Events are used to trace unauthorized access attempts to an MQ object. For access auditing purposes, we would also like to have “positive authorization” events, i.e. to trace authorized access to a particular MQ object.
6 days ago in MQ, MQ Advanced & MQ Appliance 0 Submitted

IS should be able to logon to the configured Proxy by NTLMv2 and/or Kerberos, currently it's only capable of BasicAuth

Integration into the network of our company needs for conctions to the outside Internet the logon to the Proxy to the Internet.
16 days ago in webMethods Integration/Microservices Runtime 0 Submitted

Consistent technique for mirroring images for an air-gapped cluster - OpenShift and CPs

Currently Redhat recommends oc -mirror for replicating images for gapped install. CP4I recommends a different tool and as a result customers have to install/support two different toolset to mirror images for air-gapped install. Would like a consis...
6 months ago in Cloud Pak for Integration (CP4I) 7 Future consideration

Add Aliases (SecureAlias, EndpointAlias and other sensitive information) to be controlled by functional privileges (aka teams functionality)

Currently access to only Applications and API assets is controlled by means of functional privileges. Other sensitive information like e.g. SecureAliases, EndpointAliases etc are not controlled by functional privileges leading to the intolerable d...
10 days ago in webMethods API Gateway 0 Future consideration

Add settings TCP_HOSTNAME_VERIFICATION_ALGORITHM for Event Streams Gateway

Hello team, could you please make setting of Hostname verification algorithm available via env variable TCP_HOSTNAME_VERIFICATION_ALGORITHM, just like there is TLS_VERSIONS? We actually wanted to use it to disable hostname verification on Event St...
14 days ago in IBM Event Automation / Event Endpoint Management 0 Submitted

Configurable logging for Event Streams operator

The ES operators log ~10000 lines per hour and all of them are INFO, however, it shows many lines of detailed config information. We would like to get possibility to configure the logging or a way to decrease that output. For us it would also be o...
16 days ago in IBM Event Automation / Event Streams 0 Submitted

Integration Server LDAP settings for nested group search

Currently Webmethods Integration Server(IS) LDAP settings do not support nested group search i.e, if a user is part of a nested group, they are unable to login to IS. We will have to use MWS to use this feature. But we don't use MWS central user m...

Ability to delete or rename virtual folders under default

If a virtual folder was accidentally named incorrectly while being added, the user should have an option to rename the virtual folder as needed. If a virtual folder was added for testing purpose, the user should be given the option to delete an un...
23 days ago in webMethods Managed File Transfer SaaS 0 Submitted

To determine re-usable ePVT of a MQ CHIN address space

We have been getting alerts for high ePVT utilization for multiple MQ CHIN address spaces regularly. This is because of high number of channel connections/disconnections driven by business requirement ie client scales up multiple connections to me...
4 months ago in MQ, MQ Advanced & MQ Appliance 1 Not under consideration

Support topologySpreadConstraints

topologySpreadConstraints is an easier way to control spread across failure-domains https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/ than fiddling with podAntiAffinities and better serves the purpose of HA. add ...
15 days ago in App Connect 0 Submitted