We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive a notification on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
If you encounter any issues accessing the Ideas portals, please send email describing the issue to firstname.lastname@example.org for resolution.
For more information about IBM's Ideas program visit ibm.com/ideas.
Support Java 2 Security to restrict application acceess to local resoures
This a CAT-I finding for DoD STIG: Below is their reasoning: Rule Title : The WebSphere Application Server Java 2 security must be enabled. Discussion : Java 2 security provides a policy-based fine grained access control mechanism that increases o...
Detailed documentation is required from the liberty team on how to configure SAML + LDAP for different vendors and how to set it up correctly to work in the 'IBM Cloud Private' Customers use different types of LDAP servers such as OpenLDAP, Active...
More flexible integration between WAS and Active Directory
For more optimal communication between WAS and Active directory, we'd like to be able to configure the connection based on AD SRV record "sites".This way the communication can be setup based on the closest available AD servers.
The Useable WebSphere Auditing Functions Are Required by the Department of Defense
The current WAS Auditing function does provide readily useable logs to even track down simple events such as starting/stopping an application server via the WAS Admin Console. I would like to see such functionality added to the NDM audit logs. I a...
WAS traditional: Allow setting JMS sessions as unshareable from the application configuration
There's a known issue (limitation) when using connections to databases or messaging providers from for example servlets without using server-managed transactions. It's described here: https://www.ibm.com/support/pages/common-reasons-why-connection...
System: WebSphere Application ServerActor: User needing improvement on existing feature Description: We are using WAS 8.5.5 and 9.0. The audit log generated by WebSphere is in binary format which is not readable by QRadar. Request to generate the ...
Create wsadmin task to get the “Management scope” for a given key store
Working on following the IBM WebSphere Traditional V9.x STIG 1.0 Checklist Details https://nvd.nist.gov/ncp/checklist/872 to secure our deployment of WebSphere Application Server V 8.5. The STIG guide is noted at V9.x; however all of the STIGs are...
3th party Hardware Cryptographic Cards supported by the IBMPKCS11Impl crypto provider
We need to register vehicles @ RDW. The RDW is the organization that provides the registration of motor vehicles in the Netherlands, https://www.rdw.nl.This is done with the Certificate of Conformity which needs to be delivered in a digital way.To...
Do not place IBM confidential, company confidential, or personal information into any field.