Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

All ideas

Showing 4469

update secldapclntd to use AES256 encryption

Currently, secldapclntd uses DES encryption to store bindpwd and ldapsslkeypwd entries in ldap.cfg.Since DES isn't considered secure any more, secldapclntd should be upgraded to use AES256 encryption.
almost 2 years ago in AIX 0 Future consideration

Background color per connection

Most ACS applications (Ifs, Sql script, Spool) are neutral in color, having the ability to identify them by a background color linked to individual connections would help when there are many open at the same time. Use Case: n/d
over 3 years ago in IBM i / IBM i Access Family 4 Future consideration

Suppress Handled SQL Messages from Joblog

SQL places a lot of messages in the joblog. When diagnosing a problem from a joblog it is often difficult to wade through which messages can be ignored and which messages represent a problem that needs further investigation. It is also often impos...
over 6 years ago in IBM i / Db2 for i 3 Future consideration

Send email with SNDSMTPEMM command with variables for the email addresses not all filled

Change this command to accept an email address with all *blanks, not as an error but as *none Example :SNDSMTPEMM RCP((&P1) (&P2) (&C1 *CC) (&C2 *CC)) SUBJECT(Email test) + NOTE(TEST) With &P2 = *blanks  TCP5300 error and the ...
about 3 years ago in IBM i / Networking 5 Not under consideration

Split host definition in SVC into 2 entries to avoid degraded hosts

PowerVC creates a single host definition in SVC and adds all VFC WWPNs (active ones and inactive ones used during LPM) to it. This results in a SVC host definition, which is always marked as degraded. Customers usually creating 2 host definitions ...
almost 5 years ago in PowerVC 2 Future consideration

Add SPOOLED FILE NAME to Input for QUSLSPL API

The QUSLSPL API allows the User Profile, User Data, OUTQ, FORMS type, but for some reason doesn't include the SPOOLED FILE NAME as an input parameter. The WRKSPLF command has this, as should the QUSLSPL API. Please add it. Use Case: The need to re...
over 3 years ago in IBM i / Print 3 Not under consideration

Provide tools for shared memory, mutexes, ...

In the original IBM i Access for Windows Navigator tools existed for managing shared memory, mutexes, ... Since the introduction of IBM i ACS and the web based Navigator these tools no longer exist wich makes development/troubleshooting much harde...
about 3 years ago in IBM i / System Management 4 Future consideration

Hardware-Tape-Encryption

According to https://www.ibm.com/docs/api/v1/content/ssw_ibm_i_74/rzam4/rzam4tapeencryption.htm the only way to encrypt tape backups without *KLM is to use software encryption.SW encryption is OK, but it uses precious CPU time and usually prolongs...
over 2 years ago in IBM i / BRMS 3 Not under consideration

Currently if a customer want to install a CA signed certificate in the PowerVC, the inclusion of Node/Cluster IPs are mandatory as per PowerVC documentation and development advise. The customer cyber security policies prevents the use of IP Addresses in a CA signed certifiate. The request of enhancement is to allow PowerVC to be installed and operated with a CA signed certificate with FQDN of the noes and Cluster FQDN.

My customer Cyber policies will not allow IP addresses in a CA signed certificate. Hence the request to enhance. Also, more customers with similar cyber security policies will benefit from this.
over 1 year ago in PowerVC 1 Future consideration

Enhance QGYOLSPL or QUSRSPLA to Find Last SPOOLED File

Today with Print Server Jobs, Threads and SQL Server Jobs, the QSPRILSP is all but useless in these environments.This request is to enhance either the QGYOLSPL or the QUSRSPLA API so they have the ability to retrieve the identity of the Last Creat...
over 3 years ago in IBM i / Print 7 Future consideration