Skip to Main Content
IBM Power Ideas Portal

Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Post your ideas

Start by posting ideas and requests to this portal to enhance a Power product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas and add comments to ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea

Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The Power teams will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.

Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.


Specific link you will want to bookmark for future use

IBM Unified Ideas Portal - https://ideas.ibm.com/ - Use this site to create or search for existing Ideas across all IBM products that are outside of Power, and track all of your personal interactions with all Ideas.

ADD A NEW IDEA

FILTER BY CATEGORY

Security

Showing 79 of 3541

V7R1 should support newer SSL Ciphers

Cryptographic support on V7R1 should support the newer SSL Ciphers that V7R2 and up also have. V7R1 is still a supported OS and since most trading partners are updating the SSL certificates that use updated Ciphers, it means that the clients using...
over 5 years ago in IBM i / Security 7 Not under consideration

Notify when DCM certificate is near to expire

The improved DCM tool, like its predecessor, does not have notification functionality a few days before certificates expire. It would be very helpful if you can notify us via email or at least in QSYSOPR and set how many days in advance we want yo...
about 2 years ago in IBM i / Security 8 Not under consideration

IBMi request new Kerberos ticket

With Enterprise Identity Mapping (EIM) and Kerberos, Windows clients can authenticate to IBMi without supplying a user and password. When the client connects, it supplies IBMi with a Kerberos ticket for authentication. A Kerberos ticket has a fixe...
over 3 years ago in IBM i / Security 5 Not under consideration

Add IFS file encryption/decryption support

Add OS support for transparent encryption/decryption of stream files in the IFS On the database side, IBM provided corresponding tooling when it introduced Db2 for i field procedures in IBM i 7.1. Field procedures allow Db2 data to be transparentl...
10 months ago in IBM i / Security 7 Future consideration

IBM i Server exit points

I use the IBM Server exit points to allow/deny and secure functions and access to my Power i LPARs. Use Case: It would be great the be able to get the IP address of the requester passed along in all of the exits. It is available in some of them li...
almost 4 years ago in IBM i / Security 7 Not under consideration

IBM i User Integration with Windows AD

With the withdrawal of the IXS / IXA there is no longer an IBM i method of integrating users between IBM i and Windows Active Directory. Allowing for the automated password sync between IBM i and Windows AD. Use Case: To modify the existing code w...
almost 4 years ago in IBM i / Security 5 Not under consideration

Enhancement to DLTUSRPRF command function

DLTUSRPRF is a common OS400 command. The change object owner is a basic and often required parameter function of this command. It should not matter if the owned object is an IFS object. IBM should understand the client desire and need to have this...
almost 5 years ago in IBM i / Security 2 Not under consideration

IBM i SSO authentication against Azure Global AD

Actually, a valid Network Authentication service and EIM configuration permits to use SSO on IBM i through different Windows AD realms for the users to authenticate to the IBM i using their windows usernames. New times requires new technologies fo...
5 months ago in IBM i / Security 3 Future consideration

Generate password based on system value settings

Would like an OS command or process to query the system value password settings and then generate a random password that meets those requirements. Use Case: Helps end users manage their passwords by given them an option to have a random one genera...
11 months ago in IBM i / Security 3 Not under consideration

Multiple QAUD* journal recievers

We would like the option to separate QAUD* journal receivers into multiple receivers depending on audit value specified in QAUDLVL/QAUDLVL2 with the same default security properties. Use Case: With multiple QAUD journal receivers we could select d...
about 4 years ago in IBM i / Security 3 Not under consideration