Watson Supply Chain Ideas
Submit new product ideas for Watson Supply Chain solutions. Before you submit, please review existing ideas; if an idea close to yours already exists, it's better to add comments or vote on the existing idea. We will review your ideas and use them to help prioritize our product development. Best of all, the portal will automatically update you when the status of your idea has been changed.
Connect with users and IBM experts on the
B2B Collaboration Community
Submit ideas for other Watson Customer Engagement Products:
• Watson Marketing
• Watson Campaign Automation
• Watson Commerce
With SPOE, the SNODEID presents a security vulnerability. The SNODEID is hard-coded in the process in clear text. Anyone authorized to use CDZ and able to read the file where the SNODEID is coded, typically in the process library, can create and submit their own process and have access on the remote node granted to the SNODEID under SPOE. Knowing the SNODEID a malicious actor could:
To mitigate this risk, we would like to have the capability to limit the use of the SNODEID by the user ID (ACID) submitting the process. A given ACID would need to be permissioned to use a particular SNODEID for a particular remote node. If the ACID were not correctly permissioned, then the process submit should fail. Ideally, the management of ACID permissions to use SNODEID's would be handled through the ESM (enterprise security manager) allowing proper separation of responsibilities between CD administrators and engineers and security administrators.
How will this idea be used?
If this idea is implemented we will restrict the use of most SNODEIDs to the ACIDs used by the production job scheduler. This will prevent unauthorized use of SNODEIDs as explained in the idea description.
|What is your industry?||Financial Markets|
|What is the idea priority?||High|
|Link to original RFE|