Skip to Main Content
IBM Power Ideas Portal

Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Post your ideas

Start by posting ideas and requests to this portal to enhance a Power product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas and add comments to ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea

Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The Power teams will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.

Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.


Specific link you will want to bookmark for future use

IBM Unified Ideas Portal - https://ideas.ibm.com/ - Use this site to create or search for existing Ideas across all IBM products that are outside of Power, and track all of your personal interactions with all Ideas.

ADD A NEW IDEA

FILTER BY CATEGORY

Security

Showing 79 of 3537

Request to enhance Digital Certificate Manager to be able to manage Java Keystores

Would like to have the ability to use DCM (Digital Certificate Manager) to be able to manage (to create/change/manage/delete) Java keystores. This would include the ability to manage existing java keystores created by java commands. And to be able...
almost 2 years ago in IBM i / Security 5 Not under consideration

Multiple QAUD* journal recievers

We would like the option to separate QAUD* journal receivers into multiple receivers depending on audit value specified in QAUDLVL/QAUDLVL2 with the same default security properties. Use Case: With multiple QAUD journal receivers we could select d...
about 4 years ago in IBM i / Security 3 Not under consideration

Support for 8k RSA Keys

The company have switched from an internal CA Certificate 3-tier with the Root being a 4k key to a new Internal CA which is 2-tier with the Root being a 8K key. As per Case TS009365368 - we were informed that IBMi currenlty do not support 8k RSA k...
3 months ago in IBM i / Security 2 Under review

Enhancement to DLTUSRPRF command function

DLTUSRPRF is a common OS400 command. The change object owner is a basic and often required parameter function of this command. It should not matter if the owned object is an IFS object. IBM should understand the client desire and need to have this...
almost 5 years ago in IBM i / Security 2 Not under consideration

Simple IBM i user password authentication via Microsoft Active Directory

A simple password authentication from IBM i to Active directory would greatly increase the usability of user profiles on IBM i. Without using SSO/EIM because this does not suit our needs. Use Case: The active directory is the main source when it c...
over 4 years ago in IBM i / Security 2 Not under consideration

EIM. request for having a command to save EIM

I want to be able to save the configuration and the users of the EIM and be able to restore to another partition. would it be possible to develop an order in this spirit?thank you Use Case: this would allow security in the case of DRP
about 3 years ago in IBM i / Security 5 Not under consideration

User profile alias.

Usualy the network account is "name.surname", so I'd like to have the same on the IBM i user profile. For example: CRTUSRPRF USRPRF(SURNAME) TEXT('Name Surname') ALIAS('name.surname'). Use Case: When the user connects to IBM i server from a client...
over 2 years ago in IBM i / Security 4 Not under consideration

Authority parameter change for the commands : QSYS/CRTDIR, QSYS/CRTLIB, QSYS/MD & QSYS/MKDIR

The WWTS tool verified that in the systems that had been upgraded there was a return to the default authority value for the following commands: QSYS/CRTDIR, QSYS/CRTLIB, QSYS/MD & QSYS/MKDIR and this resulted in a non-conformity for this clien...
about 1 year ago in IBM i / Security 6 Not under consideration

New command WRKSVRAUTE

We are increasingly using server authentication entries in our environment for managing DDM(IP) and DRDA authorisation of users between systems. Whilst we can display the entries for an individual user with DSPSVRAUTE or use the QSYS2.DRDA_AUTHENT...
over 4 years ago in IBM i / Security 5 Not under consideration

New curves in Qc3GenECDHKeyPair API

Only BRAINPOOL and NIST curves can be used to generate Elliptic Curve Diffie-Hellman key pair (Qc3GenECDHKeyPair API) but based on https://safecurves.cr.yp.to/ Curve25519, Curve2213, etc. are safer curves.We are software editor and our file transf...
about 3 years ago in IBM i / Security 4 Future consideration