Skip to Main Content
Integration


This is an IBM Automation portal for Integration products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.


ADD A NEW IDEA

Pinned ideas

View all
PINNED supports ECDH-ES algorithms for JWE
Debit or credit card tokenizers (THALES / VISA / Etc.) implement JWE with ECDH as an encryption mechanism for sensitive data in the different flows applicable to wallets such as Apple Pay, GPay, etc. given its wide diffusion and easy adoption.
PINNED Add a "Maximum persistent reuse" parameter for the backside of an MPGW or WSP
On an MPGW or a WSP, I want to be able to configure that the persistent backside connection should be closed after X amount of requests have been sent through that connection. I can already do this for the frontside by setting the "Maximum persist...

All ideas

Showing 115

Support for long HSM key names

The current HSM does not allow to use speaking names (e.g. the common name of the corresponding certificate) for the keys as the complete path (e.g. hsm :// hsm3 /www.foobar.com) may not contain more than 31 characters.
about 2 months ago in DataPower Gateway 0 Under review

Make Name-Value Profiles available to the MPGW

The DataPower Web Application Firewall service allows to use Name-Value Profile objects to filter headers and/or cookies. It would be quite helpful to have an action that makes Name-Value Profiles useable in a Multi-Protocol Gateway service.
about 2 months ago in DataPower Gateway 0 Under review

Simplified HSM key rotation

The current DataPower Crypto Tools do not allow to overwrite an existing HSM key i.e. when doing key rotation all references have to be changed manually. It would be very helpful to have the possibility to overwrite an existing HSM key and the rel...
about 2 months ago in DataPower Gateway 0 Under review

shared HSM domain

The current HSM strictly isolates application domains i.e. HSM keys in one application domain are not visible in another application domain. This is an important security feature, but there are valid use cases where it would be very helpful to hav...
about 2 months ago in DataPower Gateway 0 Under review

Feature to have ascp command to support email notification upon successfull file transfer with the log file

Feature to have ascp command to support email notification upon successfull file transfer with the log file. Right now I can't see EMial as an option:https://www.ibm.com/docs/en/ahts/4.4.x?topic=line-ascp-command-reference
20 days ago in Aspera Ideas 0 Under review

Please have the GCM Cipher Key Resets managed server side in TLS1.2

For governance to control the risk , this will benefit all clients which current don't support doing it (Java/JMS/.NT..etc). It should be configurable via MQ that if a certain size is exchanged without a TLS key reset done by the client then the s...
22 days ago in MQ, MQ Advanced & MQ Appliance 0 Under review

Add TLS1.2 Cipher - ECDHE-RSA-CHACHA20-POLY1305(IANA: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256)

All ciphers available in MQ for TLS 1.2 are using only two modes , GCM (with restrictions) and CBC which has been target to many vulnerabilities. It's of much use for older applications that are not yet ready for TLS1.3 to have a secure stable opt...
22 days ago in MQ, MQ Advanced & MQ Appliance 0 Under review

Add ViewCheckpoints "http get" command to the existing rest-mgmt commands

The command would enable a user to receive a list of configuration checkpoints currently existing in an application domain. The existing ROMA commands already contain the options to SaveCheckpoint, RemoveCheckpoint, or RollbackCheckpoint, and the ...
about 1 month ago in DataPower Gateway 0 Under review

Support of 3rd party SFP's

Support and certify a wider range of SFP's that are commercially available to clients. The IBM specification in this case, results in Nedbank having to change their network cabling configuration in their Data center. There is a reality that networ...
about 2 months ago in MQ, MQ Advanced & MQ Appliance 1 Under review

Update key algorithms

The customer has updated their workstation to RHEL9, since RHEL9 does not support for key algorithms rsa, and failed to ssh to the DataPower Gateway CLI
25 days ago in DataPower Gateway 0 Under review