Skip to Main Content
IBM Z Software


This portal is to open public enhancement requests against IBM Z Software products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Not under consideration
Workspace GDPS
Created by Guest
Created on Nov 7, 2024

GDPS provisions SAF controls for accessing Netview when Netview already has a SAF resource to perform this. This means there are now two resources protecting the same function

With the implementation of GDPS 4.7 and the steps outlined in Role based security, GDPS folks have provided the following profile GDPSADMIN.USERCTL.<domain_id>.   This means that when role based security is enabled and GDPS 4.7 is initialized on the Netview that unless access is given to this resource , the user will not be able to sign onto the Netview Domain, even if it is not for GDPS related functions.

This particular profile is a duplicate of the profile setup by Netview documented in the Security reference manual:

 

they can be authorized to log on to a particular NetView host through a profile in the APPL class of an SAF product. You can use
domain identifiers to define resources in the APPL class to represent instances of the NetView program.

 

At this point I need to have access to 

GDPSADMIN.USERCTL.DMN1

AND

APPL.DMN1

 

To get access to the same resource DMN1.

 

I believe that the GDPS resource should be removed and users utilize the documented Netview SAF resource for controlling 3270 access to the n=Netview domain.

 

If users have not yet deployed SECOPTS=SAFCHECK or SAFDEF then if GDPS wishes to use their current profile and option should be stated as to which Profile to use for example an option that states:

 

USERCTL= GDPS or USERCTL=NETV

 

 

 

Idea priority Low
  • Guest
    Reply
    |
    Dec 12, 2024
    After giving the request a comprehensive review, we have determined that we cannot include it as a candidate in an upcoming release because it is not consistent with the product architecture and our strategy for future releases.