Skip to Main Content
IBM Cloud - Structured Ideas


This portal is to open public enhancement requests against IBM Cloud and its products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

IBM Cloud Support Center (https://cloud.ibm.com/unifiedsupport/cases/form) – Use this site for any IBM Cloud defect or support need.

Stack Overflow (https://stackoverflow.com/questions/tagged/ibm-cloud) – Use this site for IBM Cloud technical Q&A using the tag "ibm-cloud".

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Security

Showing 19

Offer organization SSL administration per API

Adding a wildcard SSL certificate per API would be a helpful feature for managing organizations with many domains. Maybe this could be integrated in the Cloud Foundry API.
over 7 years ago in Security 0 Not under consideration

AI in security systems

We can use AI as following Let the system has all the data what is going on on borders.. Air space etc etc.. And every conditions that what had happened before in every war or small cross border fire... Strategies and their results... And let the ...
almost 4 years ago in Security 0 Not under consideration

A password policy in place for IBMCloud /SL VPN

IBMCloud /SL VPN - A password policy in place for minimum password length (15), maximum password length, using password complexity requirements, enforcing password history and maximum password age
almost 4 years ago in Security 0 Not under consideration

Flexi Cryptography

I have made a encryption and decryption algorithm which is really very hard to crack .Features :* Same number can represent multiple or different alphabet in the encrypted message .* Different number can represent same or multiple alphabet in the ...
over 4 years ago in Security 0 Not under consideration

Data Security From Peers in Public Places Applicable For both Mobiles and Laptops.

https://rockwellautomation-my.sharepoint.com/:p:/p/hkrishn1/ETkzuYTFmCdGrty2HL9PzAwBFFDdexJYCKyAe52uU3PXag?e=GRUTnq
almost 5 years ago in Security 0 Not under consideration

Virtuel browser

No description provided
almost 6 years ago in Security 0 Not under consideration

Ltpatoken2 cookie causing conflict in Login/UAA Bluemix component

Hi,  we have detected with IBM experts a cookie conflict between BNPP applications and Bluemix Login UAA application (Ltpatoken2 cookie).  It is not simple to change the cookie behavior on our side : the cookie is set at xxx.xxxxx level in order t...
almost 7 years ago in Identity and Access Management 1 Not under consideration

Provide a documentation which explains test cases tested by ASoC

Currently there is no documentation for test cases which Application Security on Cloud can run. Please take a look at Ticket 5377-13246768 for the detail information.
about 7 years ago in Security 0 Not under consideration

AI in security systems

No description provided
almost 4 years ago in Security 1 Not under consideration