Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Ideas

Showing 677 of 4992

Add Function Usage for SQL Statements similar to Allowed SQL Statements in Query Manager

Query Manager allows for limiting of SQL Statements, ALTER, DELETE, UPDATE, INSERT, etc. which is helpful to reduce the amount of users who can use SQL to manipulate tables. However, it only works within Query Manager. Can a Function Usage be adde...
5 days ago in IBM i / Security 1 Submitted

iAccess Printer Host-Based Security

Currently QTCP is required to start a Host Based Printer. However, this opens up security that a user can setup a HOST Based printer that allowed them to redirect the HR files. Is it possible to restrict a Host Based Printer from being started unl...
5 days ago in IBM i / Security 0 Submitted

RSEAPI - Force session usage

Hello, APIs can be used either with basic auth or by opening a session using a token. Some APIs, such as those that return session information, can only be called with a token. The setting to limit usage, `POST /api/v1/admin/settings`, only applie...
5 days ago in IBM i / Security 0 Submitted

Provide FTP virtual directories

Allow a user (on a per user basis, preferable via the QIBM_QTMF_SVR_LOGON exit) to be locked into a specific FTP directory... this directory should be his virtual root (jail). This concept prevents the user from navigating or specifying a path out...
12 days ago in IBM i / Security 1 Submitted

IP awareness of MFA within TOTP intervals

MFA authentication must be renewed if requests come from a different IP address, even if a TOTP interval has been set.
12 days ago in IBM i / Security 0 Submitted

Update nmon to use the new folding API

Currently, the NMON algorithm is showing continuous unfolding in the reporting when none is really happening
17 days ago in AIX 0 Submitted

Extend the TSD database to include everything that ships with AIX

Currently, there are many binaries/libraries that are not part of the TSD. As a direct result of this, enabling Trusted Execution produces a large volume of logging. Another side effect is that it's effectively a non-starter to set Trusted executi...
17 days ago in AIX 0 Submitted

AIX Toolbox needs feature parity with RHEL.

By not having a fat FOSS layer, IBM is self-selecting AIX out of consideration for the vast majority of ISVs out there. Note that I have nothing but praise and respect for the team that is keeping the Toolbox alive on a shoestring budget, but they...
17 days ago in AIX 0 Submitted

Add a function usage that allows selected users to restore programs with adopted authority, overriding the QALWOBJRST system value.

For security, a customer may by default set QALWOBJRST to disallow adopted authority objects to be restored. When a justified restore is needed, the setting is relaxed for a short time and for all users rather than just for the user(s) that actual...
26 days ago in IBM i / Security 2 Submitted

adding 2 columns to authority collection

I am using a lot authority collection. Fabulous tool even though not complete (some object types are not covered, which requires extra work). During my numerous remediation projects, I really feel we need to add 2 things in the collection: The tim...
about 1 month ago in IBM i / Security 0 Submitted