Skip to Main Content
IBM Z Software


This portal is to open public enhancement requests against IBM Z Software products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Delivered
Categories Runtime
Created by Guest
Created on Aug 17, 2015

Provide a means to limit the permitted ciphers within a CICS region

Provide a means (SITPARM, USS configuration file, etc.) to explicitly permit/deny certain SSL ciphers from CICS.

Idea priority High
  • Guest
    Reply
    |
    Jun 17, 2022
    Support for this is provided in CICS TS 6.1 which is generally available from 17th June 2022.

    For more information see https://www.ibm.com/docs/en/cics-ts/6.1?topic=whats-new
  • Guest
    Reply
    |
    Apr 5, 2022
    Support for this is provided in CICS TS 6.1 which is announced today April 5th and will GA June 17th 2022.

    See Announcement letter https://www.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_ca/2/897/ENUS222-092/index.html&request_locale=en
  • Guest
    Reply
    |
    Oct 18, 2021

    This is something we would like to address. The RFE is being moved into 'Planned for Future release' status. Please note:
    IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.

  • Guest
    Reply
    |
    Oct 15, 2019

    Apologies, this was moved to planned for future release in error. It is a candiadte for a future release, but not just yet.

  • Guest
    Reply
    |
    Oct 14, 2019

    This is something we would like to address. The RFE is being moved into 'Planned for Future release' status. Please note:
    IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.

  • Guest
    Reply
    |
    Oct 5, 2015

    Due to processing by IBM, this request was reassigned to have the following updated attributes:
    Brand - Servers and Systems Software
    Product family - Transaction Processing
    Product - CICS Transaction Server

    For recording keeping, the previous attributes were:
    Brand - WebSphere
    Product family - Transaction Processing
    Product - CICS Transaction Server

  • Guest
    Reply
    |
    Sep 11, 2015

    Thanks Arshia. This is a candidate for a future release.

  • Guest
    Reply
    |
    Sep 10, 2015

    That is exactly what we are looking forward. The mechanics of how to implement would be at your discretion. Using a "ALLVALIDCIPHERS.XML" sidefile via USSCONFIG would be fine. Thank you!

  • Guest
    Reply
    |
    Sep 9, 2015

    Arshia,
    many thanks that is useful additional information.

    As an alternative suggestion, we could have a master list of ciphers in USSCONFIG which only the network security personnel can update. This list would consists of those ciphers which you wish to support. This would probably be the ALLVALIDCIPHERS.XML
    that we already ship as a sample.
    Any way of specifying ciphers (API, RDO with cipher names, or RDO with an XML file), will only allow ciphers from that list.

    Note that the only ciphers that we can support in CICS are those that are defined in system SSL, so our list would be a subset of those.

  • Guest
    Reply
    |
    Sep 3, 2015

    The problem in the proposed scenario is that is still doesn't limit API calls. They will continue to use the full suite of ciphers available to the CICS region, which is the same problem we have if a RDO entry doesn't specify either a manual entry of ciphers or the USS side-file and then makes an HTTPS call - it will use the full suite of ciphers available to the region rather than the subset network security personnel would want.

  • Guest
    Reply
    |
    Sep 2, 2015

    In 5.1 we introduced a mechanism whereby instead of the CIPHER option specifying a list of 2 digit ciphers,
    you could specify an XML file name. This new file could contain either 2 digit or 4 digit ciphers and hence allowed the stronger TLS 1.2 ciphers.
    The XML file is in the subdirectory /security/ciphers which should be set with permisions restricting to suitable network security personel.

    For migration reasons we didn't prevent the old mechanism from explicitly using the 2 digit ciphers in the CIPHER option from being used.

    Would a solution to this be to have a configuration option which just prevented the old mechanism from being used.
    If this were set the RDO definition would only allow an XML file name.
    This would give an indirection which would mean that only
    network security personnel could then specify which ciphers could be used.
    We provide 3 sample xml files, but you can decide whether you want to one or more of these, or create one or more of your own.