Skip to Main Content
Integration


This is an IBM Automation portal for Integration products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.


ADD A NEW IDEA

Pinned ideas

View all
PINNED supports ECDH-ES algorithms for JWE
Debit or credit card tokenizers (THALES / VISA / Etc.) implement JWE with ECDH as an encryption mechanism for sensitive data in the different flows applicable to wallets such as Apple Pay, GPay, etc. given its wide diffusion and easy adoption.
PINNED OpenAPI schema validation including headers
Currently to schema validate a REST based API in DataPower you have to extract the JSON schema from the OpenAPI file and then code manually code the individual header checks defined in the OpenAPI file Would be a vast improvement to be able to j...

All ideas

Showing 2680 of 2680

Log SQL Injection Attack Without rejecting Transaction

Log SQL Injection Attack Without rejecting Transaction of Web Application Firewall.
almost 6 years ago in DataPower Gateway 0 Not under consideration

Improvement for CIT scanner and wscansw of LMT

LMT scans for software signatures etc via the CIT Scanner and wscansw process.When the software scan is running, it is somehow traversing all the directories andscanning for all files. If the scanner would collect the number of files and their siz...
almost 6 years ago in IBM License Metric Tool (ILMT) 0 Future consideration

MQ Salesforce bridge to be able to listen to SF Change Data Capture

Salesforce is now offering the 'Change Data Capture' feature to be track changes on Salesforce records. This is working with the same protocol (Comet/Bayeux) as Platform Events. MQ Bridge could theoretically be able to subscribe to those events bu...
almost 6 years ago in MQ, MQ Advanced & MQ Appliance 2 Not under consideration

Include command "getent group mqm" in runmqras

Currently runmqras issue command "id mqm" but not "getent group mqm". The command "getent group mqm" is helpful to know which userids are in group mqm.
almost 6 years ago in MQ, MQ Advanced & MQ Appliance 0 Future consideration

SOAP Security Signature not correct - Namespace prefix for id-attribute is missing

In W3C specification of SOAP Security Extension (https://www.w3.org/TR/2001/NOTE-SOAP-dsig-20010206/) in chapter "2.3 SOAP-SEC:id Attribute" is the reference attribute "id" defined with an namespace prefix of xmlns:SOAP-SEC="http://schemas.xmlsoap...
almost 6 years ago in DataPower Gateway 0 Not under consideration

GET and POST Interchangeable

The application was found to allow parameters using either the HTTP GET or POST methods interchangeably. This provides two separate HTTP method inputs to the application server which may have implications such as allowing certain attacks to be mor...
almost 6 years ago in DataPower Gateway 0 Not under consideration

DPOD 1.8.5 option to set predefined duration for Syslog Setup IDG using DPOD UI

There is customer were they have many IDG and High Load that initial scope of monitoring ALL the time, ALL the feutures, for ALL the IDG will imply a lot of hardware resources on the DPOD nodes. In that cases a bussiness option definition is to us...
almost 6 years ago in DataPower Operations Dashboard 0 Not under consideration

Allow file audit and logging in the default domain

The Application Domain for the default domain is read-only configuration. Because of this, we are not able to turn on file auditing and monitoring which is preventing us from monitoring for unauthorized file changes. As this is allowed for all oth...
almost 6 years ago in DataPower Gateway 0 Not under consideration

MQ Client offloading workload to zIIP

We use both DB2 and MQ subsystems, and in both cases we access via client.While in case of accessing to DB2 from DDF (jdbc client), workload is offloaded to zIIP (60%). In case of accessing to MQ from an external client, no workload is offloaded t...
almost 6 years ago in MQ, MQ Advanced & MQ Appliance 2 Not under consideration

Ability to issue key generation and certificate generation commands from embedded Gematlto Safenet Luna client

Please provide the ability to issue the following key generation and certificate generation commands from embedded Gematlto Safenet Luna client on DataPower:./cmu generatekeypair ./cmu export ./cmu setAttribute./cmu requestcertificate./cmu import....
about 6 years ago in DataPower Gateway 0 Not under consideration