Skip to Main Content
IBM Z Software


This portal is to open public enhancement requests against IBM Z Software products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Clear

zSecure

Showing 28

Add option to AM.1 and AM.2 to filter out UserIDs that are REVOKED in current RACF DB

Provide an option to filter out UserIDs that are in REVOKE status in the current RACF DB.
over 3 years ago in zSecure / zSecure Admin 1 Delivered

Add policy profile for 'NOCSDATA' parameter for User, Dataset, Group and General Resource Profiles

Ability to control the deletion of Custom Fields via the specification of the 'NOCSDATA' parameter for User, Group, Dataset and General Resource profiles.
about 4 years ago in zSecure / zSecure Command Verifier 3 Delivered

Increase precision of counters for RACF commands in the REPORT VERBOSE/TERSE command when using RACF-Offline

RACF-offline provides the REPORT VERBOSE/TERSE command to include a summary of RACF commands issued as part of the RACF-Offline session. Currently the precision is 16 bits which means that any RACF command issued more than 65,535 times will have t...
over 1 year ago in zSecure / zSecure Admin 1 Delivered

Increase limit of directories in CKFREEZE for USS resulting in CKR1718

We are growing in USS and writing more and more logs, especially from WebSphere we reached a limit within CKFREEZE to hold and store the required data for USS directories. In a dedicated path for logs we already have 1.2mio directories (and growin...
almost 3 years ago in zSecure / zSecure Admin 1 Delivered

Add option or make it default to use PHYSICAL_ATTR instead of ATTR RE:U:F

See IBM case tickets TS016343010 and TS016139824. If you read thru the cases, you'll see that z/Secure is not displaying the correct data when querying the USS file permission bits. We searched on GLOBAL WRITE files and directories and got very fe...
over 1 year ago in zSecure / zSecure Admin 3 Delivered

publish a listing of all the supported STIGs

enhancing the documentation to explicitly mention how many DSA STIG controls are covered, and which specific ones are not in zSecure Audit
almost 2 years ago in zSecure / zSecure Audit 1 Delivered

RFE to have a delete of the history record added to the zSecure interface.

It would appear that the history logs still contain a record with that DATASET class. Run option AU.R.H and select history log record type "Configuration", it should report 2 records for PROP_UIDs_: one will be DATASET and the other PROPCNTL. Unfo...
over 2 years ago in zSecure / zSecure Audit 3 Delivered

zSecure Audit should support evaluation of Trusted Context in DB2

Trusted Context is a way to establish a DB2 connection and operate with a known authorization id without authenticating with e.g. a password. Such connections can be a risk, and should be verified to match an enterprise´s security requirements.
over 2 years ago in zSecure / zSecure Audit 1 Delivered