Skip to Main Content
Cloud Platform


This is an IBM Automation portal for Cloud Platform products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.


Status Submitted
Created by Guest
Created on Sep 30, 2024

Allow IBM HTTP Server behind a proxy/LB that performs SSL offloading to become aware that the original request uses https

In a situation where IHS is behind another proxy/LB that performs SSL offloading, it would be beneficent to implement a behavior similar to WAS, to check a http header defined by the web container custom property 'httpsIndicatorHeader' to know that the original request uses https. The web container property 'httpsIndicatorHeader' is configured for WAS and the LB sends the configured header with the request. With this setup, WAS is able to determine that the original request was sent with https and the getServerPort method returns 443 (default https port since the Host header does not contain port number). This works as expected during virtual host mapping as the server would try to match virtual host <hostname>:443.

However, for IHS, the case is different. IHS seems to be unable to determine that the original request was sent over https. And since the Host header of the request has no port number (request is made through a web browser), IHS would set $WSSP private header to the default http port 80, and while virtual host mapping, it would try to map <hostname>:80 instead of the expected <hostname>:443. Because of this, we had to add an extra alias <hostname>:80 to the virtual host configuration in WAS, something that is misleading as the original request is a https request that is received on LB on port 443.

By allowing IHS to inspect a request header like WAS with httpsIndicatorHeader, it would assist in situations similar to the above.

Idea priority Low