Skip to Main Content
IBM Power Ideas Portal

This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (

Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.

Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal ( - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal ( - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM. - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.



Showing 27

Provide a view to list all files/objects which have authority collection turned on (i.e. AUTCOLVAL(*OBJINF))

Due to the nature of authority collection, it's common to leave it turned on for days/weeks. It's easy to lose track of what objects are being collected. Checking across the entire LPAR is generally not feasible (including the IFS). One roundabout...
about 2 months ago in IBM i / Security 3 Delivered

Support a modern hashing algorithm like bcrypt as a password level

The currently available algorithms for i are a SHA1 hash (salted with username and mutually agreed upon IVs) and a custom DES implementation that does similar. The problem is both of these are broken algorithms - SHA1 has been broken in this decad...
over 6 years ago in IBM i / Security 4 Delivered

Check expiration certificate

Create a view or an udf who give the expiration date of a certificat SSL.The same option exist in DCM (manage user certificate and checkexpiration) .in this case who can create an alerte 30 days before expiration for exemple. Use Case: The same op...
over 4 years ago in IBM i / Security 5 Delivered

Add support for multiple DNS names in new Digital Certificate Manager

The need to have both the DNS and fully qualified name in the certificate Subject Alternative Name field is a requirement for secure web browser connections. The field only allows one entry to be submitted into the SANs field when creating a new c...
over 2 years ago in IBM i / Security 3 Delivered

IFS and WRKOBJ security (general + ssh)

A very old but still annoying thing:User can see objects which he does not has access rights to - this can expose system to hacking attempts as user names also are exposed. While object based access (like WRKOBJ) does hide objects a user does not ...
over 4 years ago in IBM i / Security 12 Delivered

Provide warning when a user profile approaches maximum total user profile internal entries

Provide warning when a user profile approaches maximum total user profile internal entries, which is approximately 50 million entries. This number is the sum of owned object, private authority, authorized user, and primary group entries for any on...
over 5 years ago in IBM i / Security 7 Delivered

Configure telnet with SSL/TLS via command

Provide API/command to supply telnet with a self-signed digital certificate (most likely created with openssl). Use Case: Today there are many manual steps(n1) required to secure telnet. The steps to secure telnet could be made as simple as runnin...
over 6 years ago in IBM i / Security 6 Delivered

Extend Qc3CalculateHash to be able to use SHA3 (FIPS 202)

We use Qc3CalculateHash API to create xml invoicedata hashes, which are needed for data exchange with the hungarian tax office. For now we have to use SHA-512 (FIPS 180-2) hashing algorithm, but as of April 1st 2020 the hungarian tax office is cha...
over 4 years ago in IBM i / Security 5 Delivered

Develop a IBM i Service for PRTPRFINT command

User profile internals *PCTFULL report provides percent full, owned object entries, private authority entries, authorized user entries, and primary group entries. This information is useful to find profiles that own object and have private authori...
over 3 years ago in IBM i / Security 6 Delivered

DCM - allow automation of Let's Encrypt certificates

The Let's Encrypt certificate authority is emerging as a free and open minimum starting point for SSL certificates. However they only issue 90 day certificates which currently would mean manually installing a new certificate at least 4 times per y...
over 7 years ago in IBM i / Security 4 Delivered