Skip to Main Content
IBM System Storage Ideas Portal


This portal is to open public enhancement requests against IBM System Storage products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Planned for future release
Created by Guest
Created on Apr 3, 2012

Provide strong authentication between TSM Server and TEC applications

The Tivoli Storage Manager (TSM) Server application should be able to provide strong authentication to Tivoli Enterprise Console (TEC) application, in order to provide security between both TSM and TEC servers and also to attend the ITCS 104 section 4.2.1.J requirement 9, which says:

- Access to the IBM blue zone from an IBM basic yellow zone is permitted using strong authentication.
- The flow must limit access to the requesting system(s) by filtering on IP Address/Subnet, Protocol and Port;
- If a technical limitation exists that prevents authentication of syslog, print, SNMP, or DNS, then a limited subset of flows are permitted using host to host, and protocol filtering. For operational guidance refer to the IES OMT Web page, at http://w3-03.ibm.com/tools/it/ittools.nsf/main/security_ies_flows. That authentication should be done through a mutual key exchange between the systems or other strict security method.

Idea priority High
  • Guest
    Reply
    |
    Jun 12, 2015

    Due to processing by IBM, this request was reassigned to have the following updated attributes:
    Brand - Servers and Systems Software
    Product family - Storage
    Product - Tivoli Storage Manager (TSM) Family

    For recording keeping, the previous attributes were:
    Brand - Tivoli
    Product family - Storage
    Product - Tivoli Storage Manager (TSM) Family