Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Security

Showing 115

A library's CRTOBJAUD setting should be honored for CRTDUPOBJ adding to the library.

This closes a security hole. The library's CRTOBJAUD setting is used to assure that objects created within the library have the auditing desired. However, CRTDUPOBJ will put an object into a library and the auditing is based on the source object's...
2 months ago in IBM i / Security 1 Not under consideration

EIM Windows domain source mapping from CRTUSRPRF

On CRTUSRPRF we have the parameter EIMASSOC. This lets us create an EIM identifier and add the current system as a TARGET. Every new user that is created need to also have the windows domain as a SOURCE in order for single signon to work. This mea...
6 months ago in IBM i / Security 2 Submitted

Creation of a new function for certificate management in DCM

Currently, to manage certificates, the user needs *ALLOBJ and *SECADM permissions. I would like to have a function that allows users to manage certificates without needing these permissions.
11 months ago in IBM i / Security 1 Under review

NX- And In-Core-Acceleration To Achieve Energy-Efficient Quantum-Safe Encryption For IBM i

This request is for activating in-core- or/and nested acceleration to support the advertised quantum-safe encryption also for IBM i.Other methods (as described below) are neither fast enough nor a simple solution for customers who use cloud or onl...
over 1 year ago in IBM i / Security 4 Under review

Digital Certificate Manager, Import Certificate by retrieve from port

Importing certificates into the DCM is a slow task that requires the transfer of files, files that are not always readily available. As in the WAS console, it would be useful to acquire the certificate directly from the Server through its IP addre...
almost 2 years ago in IBM i / Security 3 Future consideration

Add an EMAIL space to the *USRPRF object and allow that value to be retrieved with the qsyrusri api and RTVUSRPRF CL command

As we add more and more user profiles, the need to send those users email from the IBM i partition (using whatever) is important. However, today there is no way to associate an email address with an end-user's *USRPRF. For example, if I need to se...
about 2 years ago in IBM i / Security 3 Not under consideration

What commands are linked to what special authority?

I want to monitor what commands needing special authority are used by who.
about 2 years ago in IBM i / Security 3 Future consideration

Allow more than 16 group profiles for a user profile

Actually, one can link a user profile to 16 group profiles. For RCAC performance, we need to link a user profile to more than 16 group profiles.
over 2 years ago in IBM i / Security 1 Not under consideration

Increase the Maximum number of entries for a user profile in V7R4

It would be great if the maximum number of entries for a user profile also would be extended i V7R4 from 50.000.000 to 200.000.000 as it is in V7R5.
over 2 years ago in IBM i / Security 3 Future consideration

Record/audit all user profile parameters/fields

We log all user profile changes into a database table. This works very well using the user profile exit points (QIBM_QSY_CHG_PROFILE etc). For some time we have decided to store additional information (eg. company number) in the user profile objec...
over 7 years ago in IBM i / Security 1 Not under consideration