Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Delivered
Created by Guest
Created on Jun 1, 2018

Provide control over who can use the SNODEID parameter

With SPOE, the SNODEID presents a security vulnerability.  The SNODEID is hard-coded in the process in clear text.  Anyone authorized to use CDZ and able to read the file where the SNODEID is coded, typically in the process library, can create and submit their own process and have access on the remote node granted to the SNODEID under SPOE.  Knowing the SNODEID a malicious actor could:

  • Retrieve the same production data that was sent by the local node to the remote node.
  • Retrieve the same production data that was or will be sent by the remote node to the local node.
  • Send bogus data from the local node to a production file on the remote node.

To mitigate this risk, we would like to have the capability to limit the use of the SNODEID by the user ID (ACID) submitting the process.  A given ACID would need to be permissioned to use a particular SNODEID for a particular remote node.  If the ACID were not correctly permissioned, then the process submit should fail.  Ideally, the management of ACID permissions to use SNODEID's would be handled through the ESM (enterprise security manager) allowing proper separation of responsibilities between CD administrators and engineers and security administrators.

What is your industry? Financial Markets
How will this idea be used?

If this idea is implemented we will restrict the use of most SNODEIDs to the ACIDs used by the production job scheduler.  This will prevent unauthorized use of SNODEIDs as explained in the idea description.

  • Admin
    Chris Sanders
    Reply
    |
    Nov 12, 2021

    Thank you for your patience as we changed direction on this enhancement and worked on it. I'm pleased to share that more granular control over who can use the SNODEID parameter has been delivered in v6.2. I'd encourage you to pull down the latest code to take advantage of this and other enhancements that were made.


    Sincerely,

    Chris Sanders

    Connect:Direct Product Manager

  • Guest
    Reply
    |
    Mar 1, 2021

    Hi Chris,
    status has changed to Not under consideration

    Has there been some other enhancement that that would mitigate this security hole in CD/z?
    Or is there some published guidance or best practices being provided to customers to avoid this security vulnerability?

    Your previous comment to this RFE is as follows;

    Thank you for opening this enhancement request with IBM. I have reviewed it with my developers and we are all in agreement that this would be a worthwhile enhancement to C:D for z/OS. We have accepted this as an Uncommitted Candidate and will look to add it to the offering roadmap moving forward.

    SIncerly,
    Chris Sanders
    Connect:Direct Offering Manager

    Charles Friedman, Vice President
    Morgan Stanley | ENTERPRISE TECH & SERVICES
    Phone: +1 212 276-2055
    Charles.Friedman@morganstanley.com

  • Admin
    Chris Sanders
    Reply
    |
    Aug 14, 2018

    Thank you for opening this enhancement request with IBM.  I have reviewed it with my developers and we are all in agreement that this would be a worthwhile enhancement to C:D for z/OS.  We have accepted this as an Uncommitted Candidate and will look to add it to the offering roadmap moving forward.

     

    SIncerly,

    Chris Sanders

    Connect:Direct Offering Manager

  • Guest
    Reply
    |
    Jun 7, 2018

    I vote yes