Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

FILTER BY CATEGORY

Db2 for i

Showing 189

Add parameters to QSys2.JobInfo, QSys2.Active_Job_Info and QSys2.Library_List_Info to accept a fully qualified job name.

I need the ability to get a specific job's Library List. Not the current job.
20 days ago in IBM i / Db2 for i 1 Not under consideration

Add a SQL Function to verify JWT (JSON Web Token)

We provide Webservices on IBM. The webservice consumers do an authentication with different types of tokens, e.g. RS256 (azure) or keycloak. It is very difficult, to verify such tokens in RPGLE. Yes, there are APIs like qc3verifysignature. But it ...
3 months ago in IBM i / Db2 for i 1 Not under consideration

Implementation of restore function that does not change the state of the access path

We would like you to implement the restore function that does not change the state of the access path by implicitly shared access paths. Our customers are having trouble getting their program to do something unexpected by save and restore. We wou...
over 1 year ago in IBM i / Db2 for i 6 Not under consideration

Require QIBM_DB_SECADM or similar to perform set session authorization

Today any user with *ALLOBJ is able to do the equivalent to sudo in Linux without the need of any password to become another user using set session authorization via SQL. Any user with *ALLOBJ can become Qsecofr by open strsql and run: “Set sessio...
12 months ago in IBM i / Db2 for i 5 Not under consideration

Select into :dsArray

It would be great to be able to select columns from a table directly into a data structure array instead of going through the process of creating a cursor. Because a lot of times you just want the list of matches and then your done. It makes even ...
over 3 years ago in IBM i / Db2 for i 6 Not under consideration

Visual explain as a SQL - IBM i service

Visual explain is a vital tool to get the information about how a SQL statement is processed and to understand the nature of SQL queries. However, it can be quite complicated to oververview complicated queries and the graph can be quite chaotic. M...
almost 2 years ago in IBM i / Db2 for i 3 Not under consideration

SQL - parse char string using external definition

Many times, in existing customers ERPs, there are fields where structured information is stored in a single big CHAR string. Usually the intent is to have a generic data carrying field in the same table, where the type of information is stored in ...
about 1 month ago in IBM i / Db2 for i 1 Not under consideration

AES Crypt

Make the AES algorithm compatible with AES calculated by different software platforms. The ENCRYPT_AES sql function can encrypt a DB column. Unfortunately the algorithm is IBM proprietary [The internal encryption algorithm used is from the CLiC To...
3 months ago in IBM i / Db2 for i 1 Not under consideration

Eliminate the Propagation of READS SQL DATA in Caller Functions in SQL

When creating User Defined Table functions in SQL, the CONTAINS SQL, READS SQL DATA and MODIFIES SQL DATA statements are currently propagated up the food chain. This means if a simple function calls another function, that called function's attribu...
almost 2 years ago in IBM i / Db2 for i 2 Not under consideration

Allow variables defined with like(...) to be used as embedded SQL host variables

Variables defined with like(...) should be usable as embedded SQL host variables. Allowing only variables defined with a specific datatype makes for more difficult application maintenance.
3 months ago in IBM i / Db2 for i 2 Not under consideration