Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Security

Showing 75

Deploy DCM with default *SYSTEM key store

Currently DCM is deployed without a *SYSTEM KDB (key store). That means, even simple applications using https requests need to create a kdb to function properly. As it is common on every other operating system these days, IBM should deploy DCM in ...
over 5 years ago in IBM i / Security 4 Not under consideration

Add user defined fields to user profiles

Adding a few user defined fields to users profiles would allow customers to directly attach useful information to user profiles. I suggest five 10 character fields. having one field long enough to store an email address would also be very helpful....
over 5 years ago in IBM i / Security 2 Not under consideration

DCM SAN update

When creating a new Certificate in the Digital Certificate Manager, you are not allowed to enter just the DNS name, you must enter the FQDN, which is typically used as the Common Name as well. Please allow adding of the DNS name to the Subject Alt...
over 5 years ago in IBM i / Security 7 Not under consideration

New Password Hashing Algorithms

Our team works in a highly regulated field and has to deal with audits to ensure compliance with regulations. Our company also has additional audits from clients that go beyond what the regulations require. These audits involve certain security ch...
over 5 years ago in IBM i / Security 4 Not under consideration

Suppress CPIB319 in QSECIDL processing

Can CPIB319 message "Profile already disabled" be made optional for QSECIDL processing? Use Case: We have some procedural hurdles to actually deleted profiles. We disable them regularly, though. When the QSECIDL jobs run checking for inactive prof...
over 5 years ago in IBM i / Security 3 Not under consideration

IBM i Server exit points

I use the IBM Server exit points to allow/deny and secure functions and access to my Power i LPARs. Use Case: It would be great the be able to get the IP address of the requester passed along in all of the exits. It is available in some of them li...
over 5 years ago in IBM i / Security 7 Not under consideration

Provide IBM PSIRT information as webservice

In a world where security problems are a daily returning issue, keeping the system up-to-date (without installing complete PTF packages) is a challenging process. While IBM has the PSIRT blog that contains this value information, it is not electro...
over 5 years ago in IBM i / Security 5 Not under consideration

IBM i User Integration with Windows AD

With the withdrawal of the IXS / IXA there is no longer an IBM i method of integrating users between IBM i and Windows Active Directory. Allowing for the automated password sync between IBM i and Windows AD. Use Case: To modify the existing code w...
over 5 years ago in IBM i / Security 5 Not under consideration

Allow rename of certificate in DCM

When installing a new certificate I need to reassign all applications to this certificate which could be avoided by renaming the certificate. Please provide a rename certificate function (or even a replace during import) like it exists in IKEYMAN....
almost 6 years ago in IBM i / Security 2 Not under consideration

Various "errors" in QUSRDIR joblog

Using the EIM API's to delete source and/or target mappings results in various errors (GLD0405, GLD021, GLD0407) in the QUSRDIR joblog. We request to do proper error handling so logging these "non-errors" is avoided as it is time consuming and con...
almost 6 years ago in IBM i / Security 2 Not under consideration