Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Security

Showing 29

Develop a IBM i Service for PRTPRFINT command

User profile internals *PCTFULL report provides percent full, owned object entries, private authority entries, authorized user entries, and primary group entries. This information is useful to find profiles that own object and have private authori...
over 3 years ago in IBM i / Security 6 Delivered

increase encrypted password hash algorithm

The request is to increase the complexity of the hashed password as it is provided by QSYRUPWD API. Use Case: Even if the API is provided with *EXCLUDE authority for *PUBLIC, for a user profile with *ALLOBJ special authority, this is easy to retri...
about 5 years ago in IBM i / Security 4 Delivered

Provide V7.3 PTF for APAR SE71873 (new DCM interface)

for the APAR SE71873 - DCM GUI UPDATE please provide the V7.3 related PTFs. I have the V7.4 version, but still have 40 + lpars that could use this updated interface Use Case: V7.3 is still supported and could use the same update to the DCM GUI tha...
almost 5 years ago in IBM i / Security 4 Delivered

Multiple Subject Alternative Names (SAN) in DCM

Maserati Spa needs for theirs cerificates a multiple SAN and not only one like now. These certificates Maserati needs to assign a server and client applications Use Case: Multiple SAN in DCM
almost 7 years ago in IBM i / Security 5 Delivered

API to check password

can you create an API to verify a generated password against - all the SYSVAL that applies - the exit program for verification of password peculiarly usefull in case of use of QPWDRULES(*ALLCRTCHG) or, better, an API able to create a password that...
almost 6 years ago in IBM i / Security 4 Delivered

Digital Certificate Manager - Need API to delete certificates in *SYSTEM store

We have over 200 IBM i partitions globally and need an API to delete certificates / certificate authorities within the Digital Certificate Manager. Use Case: DCM on each IBM i partition contains the certificate authorities from every other IBM i p...
over 4 years ago in IBM i / Security 6 Delivered

Support for 8k RSA Keys

The company have switched from an internal CA Certificate 3-tier with the Root being a 4k key to a new Internal CA which is 2-tier with the Root being a 8K key. As per Case TS009365368 - we were informed that IBMi currenlty do not support 8k RSA k...
over 2 years ago in IBM i / Security 4 Delivered

Overide QMAXSIGN on user profile

Possibility to exclude singel user from QMAXSIGN system value. Use Case: Many users uses the same function (eg.FTP) with a common user profile (system user profile) IBM i. Sometimes one of the users logon with wrong password and accidenty disables...
over 6 years ago in IBM i / Security 3 Delivered

Remove invalid option from help for CHGUSRAUD.

Prompt CHGUSRAUD Press F1 for help on User action auditing . . . . . . AUDLVL You will see: *NETSCK Sockets tasks are audited. The following are some examples: o Accept o Connect o DHCP address assigned o DHCP address not assigned o Filtered mail ...
over 5 years ago in IBM i / Security 2 Delivered

MI GENUUID Version 4

The MI instruction GENUUID should be able to generate an UUID version 4 too. Use Case: An UUID version 1 seems not to be unique enough to use it in an ELK stack. Currently we solve this problem by using java.util.UUID with RPG.
over 7 years ago in IBM i / Security 4 Delivered