DataPower

 View Only

Welcome to IBM DataPower

As a participant, connect with IBM subject matter experts and get answers to your biggest concerns. Also, share ideas, benchmarks, best practices, and lessons learned with other users. As a member of this online user community, you gain:
  • Direct engagement with IBM subject matter experts
  • Tips and tricks from your industry peers
  • News, announcements, and enhancement details
You’ll also get information regarding our regional and virtual user group meetings, upcoming webinars, how-to blogs, and training. We invite you to participate and ask that you contact support@communitysite.ibm.com with any questions.

IBM DataPower Resources

  • Learn more about IBM DataPower Gateway here.
  • What is driving containers adoption? read the datasheet here.


Latest Discussions

  • Hi Asim, DataPower will block any attempt to send a GET request with payload. The HTTP specification does not really forbid GET requests with payload but it says "A client SHOULD NOT generate content in a GET request unless it is made directly to ...

  • Hi Shanmuga, There is a SOMA request <man:do-view-certificate-details> <man:certificate-object>?</man:certificate-object> </man:do-view-certificate-details> so if you know your DataPower certificate object names, you could ...

  • You can use the XML management command "CryptoExport". There is another op "ViewCertificateDetails". Both ultimately export the certificate in Base64, which you'll have to decode from PEM and then read into something that can reveal the certificate ...

Latest Blogs

  • Datapower GitOps: Simplifying DevOps Introduction The goal of the Datapower GitOps is to have a single point of truth for the configuration of multiple Datapowers. This also allows the possibility to make a change only once ...

  • DataPower Operations Dashboard (DPOD) is no w available for API use cases with pricing that scales seamlessly with API call volumes with the Cloud Pak for Integration API Calls add-on What is DataPower Operations ...

    2 people like this.
  • Application security is essential in any IT architecture. With software and applications deployed across multiple clouds, data centers, and architectures, today’s IT environments are complex and continue to expand at a rapid pace. Securely exposing mission-critical ...

Community Members
2119 Members
group Admin
group Moderator
group Leadership
group Admin
group Moderator
group Leadership
group Admin
group Moderator