Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Security

Showing 134

Issue audit journal entry when Password Level 4 hash is generated at signon.

For high availability replication products, knowledge is needed when a user profile changes. In most cases an audit journal entry is issued. However, when both the source and target systems are at OS 7.5 or 7.6 and a user profile does not yet have...
about 2 months ago in IBM i / Security 1 Under review

Add an additional special authority *NONSYS

With the introduction of a SPCAUT *NONSYS which which should include *ALLOBJ WITHOUT operating system libraries the system administrator should be able to easily seperate e.g. developers from system administrators. This option would avoid accident...
2 months ago in IBM i / Security 1 Submitted

Add Native DCM support for ACME protocol (Automatic Certificate Management Environment)

IBM i 7.4 introduced APIs that support Native Digital Certificate Management, I would like IBM to build on this a deliver a natively supported ACME (Automatic Certificate Management Environment) protocol support to allow IBM i to automatically req...
almost 2 years ago in IBM i / Security 4 Not under consideration

Tcp server certificate hot reload

A few days ago I read an article reporting the future intention to go to decrease the duration of certificates, it would be important to make sure that the application of such certificates would not require the shutdown and subsequent activation o...
4 months ago in IBM i / Security 2 Submitted

Allow Multi-factor authentication option to enable SMS/Email authentication methods in IBM i 7.6

Implementing email or SMS as additional MFA options on IBM i could enhance user convenience and adoption by providing familiar and easily accessible authentication methods. It would eliminate the need for every user to rely on authenticator apps, ...
about 1 month ago in IBM i / Security 0 Submitted

IBM i SSO authentication against Azure Global AD

Actually, a valid Network Authentication service and EIM configuration permits to use SSO on IBM i through different Windows AD realms for the users to authenticate to the IBM i using their windows usernames. New times requires new technologies fo...
over 3 years ago in IBM i / Security 3 Future consideration

Allow the default value of function QIBM_RUN_UNDER_USER_NO_AUTH to be set to *DENIED (it is currently not changable)

Function QIBM_RUN_UNDER_USER_NO_AUTH is very efficient to prevent illegitimate impersonations. Its added value goes far beyond the protection of *TOTP users.The default value is *ALLOWED, which is understandable. The fact that we can’t change the ...
about 1 month ago in IBM i / Security 0 Submitted

Enhance Security of QUSEADPAUT system value and USEADPAUT in general

This is similar in intent to https://ideas.ibm.com/ideas/IBMI-I-4498 In support of 'deny by default' security principle, arrangements should be made to only generate programs and service programs with USEADPAUT(*YES), when A) explicitly requested ...
5 months ago in IBM i / Security 2 Under review

Add auditing to successful authentications

IBM i records failed authentications, which appear in the audit journal entries, but is missing a unified entry type for successful authentications. From an auditing perspective, this makes it hard to comprehensively track and report on successful...
over 2 years ago in IBM i / Security 3 Future consideration

Notify when DCM certificate is near to expire

The improved DCM tool, like its predecessor, does not have notification functionality a few days before certificates expire. It would be very helpful if you can notify us via email or at least in QSYSOPR and set how many days in advance we want yo...
over 5 years ago in IBM i / Security 8 Not under consideration