Skip to Main Content
IBM Power Ideas Portal

Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Post your ideas

Start by posting ideas and requests to this portal to enhance a Power product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas and add comments to ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea

Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The Power teams will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.

Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.


Specific link you will want to bookmark for future use

IBM Unified Ideas Portal - https://ideas.ibm.com/ - Use this site to create or search for existing Ideas across all IBM products that are outside of Power, and track all of your personal interactions with all Ideas.

ADD A NEW IDEA

FILTER BY CATEGORY

Networking

Showing 48 of 3539

SMTP via Google relay

Google recently issued this: https://support.google.com/accounts/answer/6010255?hl=en#zippy= And I am wondering what effect, if any, this will have on being able to email from the IBM i via google email relay using IBM's SMTP. We send hundreds of ...
5 months ago in IBM i / Networking 3 Not under consideration

Within the LDAP configuration we would like to deactivate the non-secure PORT 389 and only allow the PORT 636 to be active.

Our common practice is to inactivate non-secure PORTs. We have an Enterprise Information Security team that performs RAPID 7 scans across our systems looking for non-secure ports. Within the Tivoli Directory Server for IBM i we want to inactivate ...
12 months ago in IBM i / Networking 4 Not under consideration

Enhancing Maximum storage for trace of TRCTCPAPP command

This RFE is now created based on the feedback from case #TS005034124 where we are not able to run the trance commands due to insufficient storage to keep the trace output/logs. Running the Trace commands trctcpapp *smtpclt *on and trctcpapp *msf *...
over 1 year ago in IBM i / Networking 3 Future consideration

Access Client Solutions - Signoff session when user closes ACS

When a user closes Access Client Solutions (ACS) by hitting the X in the upper right corner or otherwise closes it, it would be nice if the session is signed off immediately instead of being disconnected. This should be possible to set op as an op...
over 5 years ago in IBM i / Networking 3 Not under consideration

OS command WRKSMTPEMM to get read version (DSPSMTPEMM)

WRKSMTPEMM needs *ISYSCFG special authority - request a DSPSMTPEMM version that does not require the special authority Use Case: Many user now use SNDSMTOPEMM to send emails from Series i. The log from the command usage is found in WRKSMTPEMM. How...
12 months ago in IBM i / Networking 2 Future consideration

Add Support for SIZE Subcommand in IBM i FTP Server

Third-Party software (https://sqlbackupandftp.com/) automates the backups of SQL Server Databases, and the remote storage site can be designated as an FTP server. When attempting to upload the file, the software validates the upload by using the S...
over 1 year ago in IBM i / Networking 4 Future consideration

autoreconnect 5250 sessions are causing a denial of service attack

Support cases: TS002923825 and TS002828742When a 5250 session (ROBS1 for example) is minimized sometimes a user will start it again from a desktop icon. Now you have 2 identical 5250 sessions fighting over the same device. The first one keeps cont...
over 2 years ago in IBM i / Networking 7 Not under consideration

Add/Remove Ethernet Ports to AGG LIND without varying off LIND

Description & Background: We are using Ethernet Link Aggregation in IBM i, each with two Ethernet ports aggregated. Due to some #EMX0 expansion drawer issues one of those Ethernet ports lost its link. For reliability reasons we tried to add a ...
about 5 years ago in IBM i / Networking 4 Not under consideration

Provide virtual FTP directory

Allow a user to be locked in a specific FTP directory... this directory should be his virtual root. Use Case: It is now possible to set an initial FTP directory via an exit program, however once logged on the user can still perform a cd /someother...
about 6 years ago in IBM i / Networking 22 Not under consideration

Cannot set security for NTP protocol on IBM i

IBM i is connected to the network core switch as a client getting the time using NTP protocol. It is also a server for the rest of the application servers providing the time for them.An audit finding was found that NTP on the IBM i is not using an...
about 4 years ago in IBM i / Networking 4 Not under consideration