Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Security

Showing 25

Add native 2FA and/or MFA for 5250 and other interfaces to data

Data security insurance and other requirements are requesting Two Factor Authentication or Multi Factor Authentication access to data.
5 months ago in IBM i / Security 2 Future consideration

Concealing Password on the ADDSVRAUTE Screen

To not reveal a password to onlookers when setting up a secure DDM environment.
5 months ago in IBM i / Security 2 Future consideration

Show profile will be disabled msg even for non-valid profiles.

OS 7.5 changed to provide the same error message when signing on for the case where a userid is not defined or a userid is valid but the password is wrong. This was intended to not 'leak' information to a bad actor that they guessed a valid userid...
10 months ago in IBM i / Security 3 Future consideration

Digital Certificate Manager, Import Certificate by retrieve from port

Importing certificates into the DCM is a slow task that requires the transfer of files, files that are not always readily available. As in the WAS console, it would be useful to acquire the certificate directly from the Server through its IP addre...
11 months ago in IBM i / Security 3 Future consideration

Correct the QSYLOBJP API Documentation

Today, the QSYLOBJP API documentation states that it creates: a list of objects that adopt an object owner's authority In the classic way of thinking, this would be program/srvpgm objects that have USRPRF(*OWNER) set a creation time. However what ...
11 months ago in IBM i / Security 3 Future consideration

What commands are linked to what special authority?

I want to monitor what commands needing special authority are used by who.
about 1 year ago in IBM i / Security 3 Future consideration

Customize encryption types for network authentication

When creating new keytab entries, the OS will automatically create entries for all known encryption types on the system: 56-bit DES 56-bit DES using key derivation 168-bit DES using key derivation 128-bit AES 256-bit AES ARCFOUR Since onl...
about 1 year ago in IBM i / Security 2 Future consideration

Add auditing to successful authentications

IBM i records failed authentications, which appear in the audit journal entries, but is missing a unified entry type for successful authentications. From an auditing perspective, this makes it hard to comprehensively track and report on successful...
about 1 year ago in IBM i / Security 3 Future consideration

Host Service Should Ignore Expired Certificates

Today I experienced that as long as an expired certificate exists, the associated services on power i (e.g. login, database, ddm) do not work and deny access despite the fact there is another certificate that is active on the same services. By del...
over 1 year ago in IBM i / Security 2 Future consideration

Provide the LPP Option when providing CVE Security bulletins

When reviewing the Security bulletins published from IBM they mention the PTF (Program Temporary Fix) Id that will fix the problem and the LPP (Licensed Program Product) but they do not mention the LPP option. With most LPP's there is only a singl...
over 1 year ago in IBM i / Security 4 Future consideration