This is an IBM Automation portal for Cloud Management and AIOps products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Please use the following category to raise ideas for these offerings for all environments (traditional on-premises, containers, cloud):
Cloud Pak for Multicloud Management
Cloud Pak for Network Automation - including Orchestration and Performance Management
Cloud Pak for Watson AIOps - including Netcool Operations Management portfolio
Edge Application Manager
IBM Observability with Instana
ITM-APM Products - including IBM Tivoli Monitoring v6 and Application Performance Monitoring v8
Workload Automation - including Workload Scheduler
Tivoli System Automation - including Tivoli System Automation Application Manager (SA AM), Tivoli System Automation for Multiplatforms (SA MP)
FTAs include conman which can submit ad-hoc commands to other workstations with the sbd command under the scope allowed by the local security file. A compromised FTA may modify its own security file at will and submit any commands to other workstations. Additionally, the communication to the Workload Automation domain managers that relays these commands could be spoofed in the network without compromising an FTA.
We need the conman commands to transmit with the credentials under which the command is believed to be authorized and cryptographically signed by the user so that the message is irrefutable and can be confirmed by the WA infrastructure and the agent on which the command is to be executed. Or some similar technique that achieves the same goal of making the commands received verifiable.
Do not place IBM confidential, company confidential, or personal information into any field.