Skip to Main Content
Integration


This is an IBM Automation portal for Integration products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.


ADD A NEW IDEA

Pinned ideas

View all
PINNED Add a "Maximum persistent reuse" parameter for the backside of an MPGW or WSP
On an MPGW or a WSP, I want to be able to configure that the persistent backside connection should be closed after X amount of requests have been sent through that connection. I can already do this for the frontside by setting the "Maximum persist...
PINNED supports ECDH-ES algorithms for JWE
Debit or credit card tokenizers (THALES / VISA / Etc.) implement JWE with ECDH as an encryption mechanism for sensitive data in the different flows applicable to wallets such as Apple Pay, GPay, etc. given its wide diffusion and easy adoption.

DataPower Gateway

Showing 349

Padding for log file rotation

Currently log file rotation is done by adding a simple index, e.g. mylog.txt will be "rotated" to mylog.txt.1 and so forth. In case of more than 9 rotations we will have a file with name mylog.txt.10 which, due to the filsystem's alphabetical orde...
5 months ago in DataPower Gateway 0 Future consideration

Strengthening DataPower safety configuration for clients with regulatory compliance

Customers in industries that are subject to regulatory review may comply with required security controls. This customer currently requires these security controls that are not implemented in DataPower: If possible, issue a \"404 - Not Found\" resp...
about 2 months ago in DataPower Gateway 0 Under review

Content-Security-Policy in DataPower

This RFE was created at the request of IBM, in support case TS017042758. To mitigate appscan scanning vulnerabilities. The current value is as follows: Content-Security-Policy: default-src 'unsafe-eval' 'unsafe-inline' 'self'; frame-ancestors 'sel...
about 2 months ago in DataPower Gateway 0 Under review

Support for long HSM key names

The current HSM does not allow to use speaking names (e.g. the common name of the corresponding certificate) for the keys as the complete path (e.g. hsm :// hsm3 /www.foobar.com) may not contain more than 31 characters.
6 months ago in DataPower Gateway 2 Not under consideration

Make Name-Value Profiles available to the MPGW

The DataPower Web Application Firewall service allows to use Name-Value Profile objects to filter headers and/or cookies. It would be quite helpful to have an action that makes Name-Value Profiles useable in a Multi-Protocol Gateway service.
6 months ago in DataPower Gateway 2 Not under consideration

Simplified HSM key rotation

The current DataPower Crypto Tools do not allow to overwrite an existing HSM key i.e. when doing key rotation all references have to be changed manually. It would be very helpful to have the possibility to overwrite an existing HSM key and the rel...
6 months ago in DataPower Gateway 0 Future consideration

shared HSM domain

The current HSM strictly isolates application domains i.e. HSM keys in one application domain are not visible in another application domain. This is an important security feature, but there are valid use cases where it would be very helpful to hav...
6 months ago in DataPower Gateway 2 Not under consideration

'host key algorithms' for SSH configurable in DataPower

SHA1 host key algorithm (ssh-rsa) for SSH connection is considered as deprecated cryptographic setting and is reported as security vulnerability for DataPower servers. As the host key algorithms are not configurable in DataPower servers we don't h...
about 2 months ago in DataPower Gateway 0 Planned for future release

DataPower Log Target Enhancements for better off appliance logging

We are looking for enhancements to DataPower Log Targets that send Log Events off the appliance to a central logging facility. To ensure all Log Messages generated by the appliance can be sent, we need Log Target capability that allows it to be on...
over 4 years ago in DataPower Gateway 0 Future consideration

Datapower virtual appliance with no manual intervention.

You ship DataPower in an OVA, which format supports basic configuration in the deploy stage. But we need to log into the VM console and type network configuration by hand; this introduces a slow and error-prone step into what can otherwise be a cl...
about 2 months ago in DataPower Gateway 0 Under review