This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
See this idea on ideas.ibm.com
Provide a proxy service for all IBM iACS functionality like 5250, ssh, database access and management, IFS access and spool file management, so a remote user can connect to a secured IBM i system and from this connect to the target system - direct connect to the target system is not possible due to network restrictions.
IBM iACS is used not only for 5250 display functions, but also for ssh access, database management, spool file access etc.
In larger environments, where you have multiple IBM i systems in multi tenant setups with dedicated networks, usually a jump pc as a proxy is used which can be connected by an operator from a remote location, and then from this pc an iACS connection to the target IBM i system is made.
As this jump pc often is run with a different operating system like windows or linux, this will create additional security and systems management measures to ensure secure access to this pc. Often, a dedicated IBM i environment is used for central management or operations work like monitoring, backup management or performance data collection, so this centralized and highly secured system already does exist.
A "proxy" for all iACS services would be great to reduce complexity of multi-tenant environments and give the operators the possibility to use only one IBM i environment for these works.
Idea priority | Medium |
By clicking the "Post Comment" or "Submit Idea" button, you are agreeing to the IBM Ideas Portal Terms of Use.
Do not place IBM confidential, company confidential, or personal information into any field.
What you are asking is beyond the scope of the ACS development team and really needs to be resolved within your organization as you consider the various security implications. There are a couple possibilities to consider where you could eliminate the intermediate PC.
1. Run ACS directly on an IBM i and send its display to your remote users device using either VNC or SSH. For an example, see the "Mobile devices?" section of this article https://developer.ibm.com/articles/i-access_client_solutions/
2. Run IBM i Access for Web (https://www.ibm.com/support/pages/ibm-i-access-web) on your secure IBM i and use that connection to connect to 5250 sessions on other systems. You can also make multiple DB connections to other systems.