Skip to Main Content
IBM Cloud - Structured Ideas


This portal is to open public enhancement requests against IBM Cloud and its products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

IBM Cloud Support Center (https://cloud.ibm.com/unifiedsupport/cases/form) – Use this site for any IBM Cloud defect or support need.

Stack Overflow (https://stackoverflow.com/questions/tagged/ibm-cloud) – Use this site for IBM Cloud technical Q&A using the tag "ibm-cloud".

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Security

Showing 34

Data Encryption

Need to create a data security service that can encrypt (or decrypt) data and pass it on to another service.
about 8 years ago in Analytics / Security 0 Not under consideration

Failed Login Attempts are not their in LogDNA even if we target specific account from CLI

Myself i tried to login into my account using CLI and see the logs in IBM Cloud Activity Tracker (eu-de region) I ran command "ibmcloud login -c <account-no> --apikey <wrong-api-key>" As i am targeting specific ibm account, ideally it ...
over 3 years ago in Identity and Access Management 0 Future consideration

Security questions' answers are shown as plain text

When we login into IBM Cloud, there is Security questions (If Configured) for 2FA. In the security questions, if we type the answer it is not hidden as secret instead it reflect as plain text.
over 3 years ago in Identity and Access Management 0 Not under consideration

Auto-renewal of SSL certificates on Bluemix apps having custom domains

We have deployed 2 of our applications out of 13 on Bluemix which are using custom domains. Also we have recently secured them by uploading SSL certificates by generating them from bluemix-letsencrypt open source project. (https://github.com/ibmjs...
over 7 years ago in Secrets Manager 0 Not under consideration

Offer organization SSL administration per API

Adding a wildcard SSL certificate per API would be a helpful feature for managing organizations with many domains. Maybe this could be integrated in the Cloud Foundry API.
about 8 years ago in Security 0 Not under consideration

AI in security systems

We can use AI as following Let the system has all the data what is going on on borders.. Air space etc etc.. And every conditions that what had happened before in every war or small cross border fire... Strategies and their results... And let the ...
over 4 years ago in Security 0 Not under consideration

A password policy in place for IBMCloud /SL VPN

IBMCloud /SL VPN - A password policy in place for minimum password length (15), maximum password length, using password complexity requirements, enforcing password history and maximum password age
over 4 years ago in Security 0 Not under consideration

Flexi Cryptography

I have made a encryption and decryption algorithm which is really very hard to crack .Features :* Same number can represent multiple or different alphabet in the encrypted message .* Different number can represent same or multiple alphabet in the ...
almost 5 years ago in Security 0 Not under consideration

Detailed control of users and access.

232/5000 Having a control of users, roles and permissions is very relevant for companies. It is currently possible to have a very simple view of users and accesses, but a detailed and exportable report is lacking to have exhaustive cont...
about 5 years ago in Identity and Access Management 0 Future consideration

Data Security From Peers in Public Places Applicable For both Mobiles and Laptops.

https://rockwellautomation-my.sharepoint.com/:p:/p/hkrishn1/ETkzuYTFmCdGrty2HL9PzAwBFFDdexJYCKyAe52uU3PXag?e=GRUTnq
over 5 years ago in Security 0 Not under consideration