Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

FILTER BY CATEGORY

IBM i

Showing 1582

Add a SQL Function to verify JWT (JSON Web Token)

We provide Webservices on IBM. The webservice consumers do an authentication with different types of tokens, e.g. RS256 (azure) or keycloak. It is very difficult, to verify such tokens in RPGLE. Yes, there are APIs like qc3verifysignature. But it ...
4 months ago in IBM i / Db2 for i 1 Not under consideration

Implementation of restore function that does not change the state of the access path

We would like you to implement the restore function that does not change the state of the access path by implicitly shared access paths. Our customers are having trouble getting their program to do something unexpected by save and restore. We wou...
over 1 year ago in IBM i / Db2 for i 6 Not under consideration

Handle %split like an array

%split is a great new feature for us, but it can be a bit tricky to handle. In order to access the second element, we need to first put the element in an array. It would be interesting if we could access the element like an array, such as in the f...
3 months ago in IBM i / Languages - RPG 1 Not under consideration

In ACS on the command line when you run a transfer from IBM i to excel without a dtfx you can not specify the locale values such as date format or decimal point

Anybody using ACS and doing batch transfer of data. This is a basic setting in countries outside US and it is blocking larger adoption of this functionality.
2 months ago in IBM i / IBM i Access Family 7 Not under consideration

ACS - Run SQL Scripts disable "insert from examples" for selected users

We have been using Access Client Solutions for several years. Mainly the 5250 sessions are used by our users, but there are also selected power users who are authorized to use the function "Run SQL Scripts".For this users it is also possible to us...
over 1 year ago in IBM i / IBM i Access Family 4 Not under consideration

FOR-EACH with record level access

The new FOR-EACH is today working on list, however it would be nice if - in the future - it could be extended to also handle record level access. ( and perhaps also user defined iterators) The basic idea is to make tighter and more concise coding ...
over 2 years ago in IBM i / Languages - RPG 9 Not under consideration

ACS Emulation screenshot in HTML

For documentations we would like to have screenshots from 5250 emulation in HTML format. Please add a button "Export screen into HTML"
about 1 month ago in IBM i / IBM i Access Family 1 Not under consideration

Require QIBM_DB_SECADM or similar to perform set session authorization

Today any user with *ALLOBJ is able to do the equivalent to sudo in Linux without the need of any password to become another user using set session authorization via SQL. Any user with *ALLOBJ can become Qsecofr by open strsql and run: “Set sessio...
about 1 year ago in IBM i / Db2 for i 5 Not under consideration

String interpolation for RPG

Add string interpolation support so variables can be inserted into string literals without having to use concatenation with + symbols and multiple literals. For example:apples = 4bananas = 3print(f"I have {apples} apples and {bananas} bananas") Us...
about 2 years ago in IBM i / Languages - RPG 11 Not under consideration

Add parameter that allows to copy owner of object with CRTDUPOBJ

When creating a duplicate object, all security related data is copied. This includes *Autl, *Public and all private authorities. The only thing missing to be copied (or not) is the owner of the existing object. For now, a CHGOBJOWN must be run aft...
9 months ago in IBM i / Core OS 3 Not under consideration