Skip to Main Content
Integration


This is an IBM Automation portal for Integration products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.


ADD A NEW IDEA

Pinned ideas

View all
PINNED OpenAPI schema validation including headers
Currently to schema validate a REST based API in DataPower you have to extract the JSON schema from the OpenAPI file and then code manually code the individual header checks defined in the OpenAPI file Would be a vast improvement to be able to j...
PINNED supports ECDH-ES algorithms for JWE
Debit or credit card tokenizers (THALES / VISA / Etc.) implement JWE with ECDH as an encryption mechanism for sensitive data in the different flows applicable to wallets such as Apple Pay, GPay, etc. given its wide diffusion and easy adoption.

All ideas

Showing 2629

Comprehensive audit logging in standard logging mode

Why - The ability to monitor for unexpected configuration change, and provide supporting evidence to any security investigation. This is required for tight security monitoring, and potentially for prosecution of rogue actors. Who - All IBM custome...
7 months ago in DataPower Gateway 2 Not under consideration

Certificate management when dealing with multiple objects

We have over 300 certs being used among multiple domains and need to have a better way to manage expiration and changes. We are requesting an enhancement to cert management in the following areas. An easy way to identify certs that are actually be...
over 1 year ago in DataPower Gateway 0 Future consideration

Application Transaction Tracing through MQ Appliance

This is critical to give customers using MQ appliance the ability to have end-to-end observability for their application stacks. Currently, customers cannot trace transactions through the appliance, creating a 'black box' scenario. This is a sever...
almost 2 years ago in MQ, MQ Advanced & MQ Appliance 0 Future consideration

.NET MQ Client: Don't look in Windows keystore when running under Linux

IBM's .NET MQ XMS client library (versions from 9.2 through 9.3 were tested), cannot make TLS connections to a Queue Manager when the C# code runs in a Linux container, because it tries to look into the “My / CurrentUser” keystore, which doesn’t e...
2 months ago in MQ, MQ Advanced & MQ Appliance 0 Under review

Two Factor authentication not configured- Insufficient authentication security control.

Integration server is not using two factor authentication, and it is not configured in critical application users who has privileged access.
2 months ago in webMethods Integration/Microservices Runtime 0 Submitted

Concurrent Session allowed for a single user

observed that the applications opens in multiple session at the same time for the same account. This widens the attack surface of the application as attackers can seamlessly use valid credentials at the same time as their legitimate owner (and mak...
2 months ago in webMethods Integration/Microservices Runtime 0 Submitted

Allow to upload only the necessary images for an specific service type on the image-tool

Currently you can upload all the API Connect images to an image repository to run it on K8s. Some clients need to run only one of the services (portal, analytics, manager or gateway) on an specific cluster, but we're forcing to upload all the imag...
2 months ago in API Connect 2 Needs more information

Configurable number of RDQM nodes

At the moment we are running MQ RDQM HA on 3 nodes. The documented process for an outageless upgrade or a rebuild is to suspend a node at which point the RDQM cluster is running on just 2 nodes which is quorum. If during the rebuild of the 3rd nod...
about 2 years ago in MQ, MQ Advanced & MQ Appliance 2 Not under consideration

Expired certificate causes DataPower's crypto validation credential object to go down

We are using IBM DataPower as an API Gateway for V10. There is this problem when a certificate in API Manager or Cloud Manager expires, it will cause the DataPower's Crypto Validation Credential object to go down which causes all the other API cal...
11 months ago in API Connect 0 Future consideration

API Connect Designer toolkit Integration with Git Repo

We need OOTB (Out of the box) feature of IBM API Connect to integrate with various source control tools/repository like Git etc. Like most of the IDEs provide this feature of directly check-in/check-out in Repo, similarly we are looking in API Con...
about 1 year ago in API Connect 2 Future consideration