Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Security

Showing 116 of 4414

Add TLS support for SNDDSTJS

Add TLS 1.3 support for SNDDSTJS to connect to a remote mail router without authentication. Advanced job scheduler notification properties does not have the option to enable TLS. TLS is required by some companies including financial intuitions.
about 2 months ago in IBM i / Security 0 Submitted

Enable TR-31 Import / Export of AES K0-B and K1-B Key Blocks for 4767/4769 crypto cards

For important bank compliance with MasterCard, we need use to TR-31 KEY EXPORTER in KEK value with mode of use BThe used parameters are:Key block version: VARDRV‑BValue of use: KEKMode of use: ENC-DEC In the APAR OA64883 was published for Z series...
3 months ago in IBM i / Security 1 Submitted

Extend field in SSL trace output that includes cipher information

When analyzing output of SSL trace data, this may involve dumping the output to a spreadsheet for further analysis and comparison against cipher lists from QSSLCSL and/or SST (TLSCONFIG). The challenge when comparing data is that since many cipher...
4 months ago in IBM i / Security 2 Under review

Make managing ciphers in QSSLCSL easier using 2-digit cipher codes and use these codes everywhere

It would be easier to manage ciphers in the system value using the 2-digit codes simply because ciphers also have to be managed in SST (SSLCONFIG/TLSCONFIG) where the 2-digit code in required when adding/removing ciphers to the eligible list. Give...
4 months ago in IBM i / Security 1 Under review

Include an "assigned" flag to DCM API to indicate if cert is assigned to an DCM application or not

There is an API that already exists that allows certificates stored in a DCM store be read and would include expiry date, which is useful. I am not sure what the API is called, but I know that TAATOOL provides a command (CVTCERT) that uses the IBM...
4 months ago in IBM i / Security 5 Under review

Provide ability to control SSL counters (in SST) from OS command line using an API

We are running v7r4 and find the SSL counters that are available within SST very useful. A challenge we face is that due to our a weekly system interruption for full system save and IPL, these counters are disabled and get reset. It would desirabl...
4 months ago in IBM i / Security 1 Under review

Creation of a new function for certificate management in DCM

Currently, to manage certificates, the user needs *ALLOBJ and *SECADM permissions. I would like to have a function that allows users to manage certificates without needing these permissions.
4 months ago in IBM i / Security 1 Under review

Add Authority Collection detail for S/36 Procedure objects being used

When using the STRAUTCOL command to trace usage of system objects, the execution of a System/36 environment procedure (STRS36PRC) does not log the name of the procedure or the objects accessed in th procedure. Unfortunately, many shops from that e...
5 months ago in IBM i / Security 3 Not under consideration

Expanding SQL to view certificates assigned to IBM i applications

In a previous release, IBM i SQL enhancements made it possible to view certificate info from the qsys2.certificate_info table using an SQL statement. The enhancement I am suggesting would take the next step and make it possible to view which certi...
5 months ago in IBM i / Security 1 Submitted

Gradual Password Rollover Time

As we all know - Security is a critical aspect of any organization’s information management strategy. One essential element of database security is managing user passwords effectively. The gradual database password rollover time refers to the abil...
6 months ago in IBM i / Security 1 Not under consideration