Skip to Main Content
Integration


This is an IBM Automation portal for Integration products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.


ADD A NEW IDEA

Pinned ideas

View all
PINNED supports ECDH-ES algorithms for JWE
Debit or credit card tokenizers (THALES / VISA / Etc.) implement JWE with ECDH as an encryption mechanism for sensitive data in the different flows applicable to wallets such as Apple Pay, GPay, etc. given its wide diffusion and easy adoption.
PINNED Add a "Maximum persistent reuse" parameter for the backside of an MPGW or WSP
On an MPGW or a WSP, I want to be able to configure that the persistent backside connection should be closed after X amount of requests have been sent through that connection. I can already do this for the frontside by setting the "Maximum persist...

All ideas

Showing 1390

Renaming gen package when using REST API services

Hi,We like to rename the "gen" package of the exposed REST API to something more business related, something like com.example.api... This will provide a more organized and funcional overview of the REST projects like the other projects that we use...
about 7 years ago in App Connect 1 Future consideration

Core: Adding websocket support to ascp4

JPMC has an internal security policy that prevents using OpenSSH on Windows, so they need websocket support for all the components they use for their transfers. They plan to use ascp4 for migrations that have hundreds of millions of objects or lar...
over 1 year ago in Aspera Ideas 0 Future consideration

Optimized database connection management

Currently WMB ODBC connections are limited in the sense that all database transactions by default are contained within the scope of the message flow transaction boundary. ESQL Compute nodes have a 'Transaction' property which can be set to Automat...
over 11 years ago in App Connect 3 Future consideration

IIB Continues Processing HTTP Requests After A Timeout Occurs

When a HTTP / SOAP-over-HTTP Request is received by an IIB Message Flow (via a HTTP Input or SOAP Input node), if a timeout occurs for that request, IIB returns the client a timeout response (error response) - this is good... the product fulfills ...
about 10 years ago in App Connect 3 Future consideration

Dynamic TLS Client Profile in Invoke Policy

Currently, we have a requirement to use TLS client profiles dynamically depending on the incoming request. The invoke policy's TLS profile setting is a drop-down that only allows the selection of known TLS profiles. The invoke policy should suppor...
over 1 year ago in API Connect 1 Future consideration

Re-word Orchestrator interactive setup prompt

In the interactive CLI setup program, it asks: What IP addresses and hostnames are allowed to access Orchestrator? This is written as if it is asking for the IP addresses and hostnames of clients, that are allowed to access the host.However, it is...
over 1 year ago in Aspera Ideas 0 Future consideration

Request to enable GCM mode symmetric encryption algorithms for AS2 connections

using datapower, we integrate some of our external third party systems using AS2 protocol to exchange B2B messages. In the AS2 destination configuration, we enable encryption. Currently datapower supports only CBC based symmetric encryption algori...
over 4 years ago in DataPower Gateway 0 Future consideration

New statistics to indicate scan time and % source change.

First scan usually takes unknown duration, but once first scan is completed, subsequent scans should indicate: - % or time estimate needed to complete based on the first scan. - % of changes compared to base scan. It should be two items reported i...
over 1 year ago in Aspera Ideas 0 Future consideration

Better job resume

Async should resume where it was stopped. Start scanning from the beginning will usually waste time, and in the case of large buckets, it could be many hours before transfer actually resumes.
over 1 year ago in Aspera Ideas 0 Future consideration

Enhanced stop reason

The tool should provide clearer reasons for stopping: - Normal stop: job completed - Normal stop with errors: job completed, but there are file transfer errors - Requested stop: a user asked to stop - Abnormal stop: job did not finish, and somethi...
over 1 year ago in Aspera Ideas 0 Future consideration