This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
A very old but still annoying thing: User can see objects which he does not has access rights to - this can expose system to hacking attempts as user names also are exposed.
While object based access (like WRKOBJ) does hide objects a user does not have access to in first level, objects within libraries are exposed without access. For example user has access to a library TESTLIB by *PUBLIC *USE but all objects within this library are set to *PUBLIC *EXCLUDE. User can run WRKOBJ TESTLIB/*ALL and sees all object names with description *NOT AUTHORIZED These objects should not display at all.
Even more of a security thread is the IFS management of access. For example, all users have at least read access to /home where the users private directories reside. Even when all subdirectories like /home/user1 /home/user2 etc are set to *PUBLIC *EXECLUDE, every user can run WRKLNK OBJ('/home') and see all directory names. Usually the home directory names are same as the user names, any user with access to the system does get a full list of users of the box which makes hacking more easy.
Do not place IBM confidential, company confidential, or personal information into any field.