Skip to Main Content
IBM Security Ideas Portal

Shape the future of IBM Security

We invite you to shape the future of IBM, including the product roadmap, by submitting enhancement ideas that matter to you the most.

Here's how it works:

Post your ideas

Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and vote for them if they matter to you,

  1. Post an idea

  2. Vote for ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea

Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.

Receive notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.

Post an Idea

To post a new idea - click on the "Add a new idea" button and where asked select the appropriate category this idea relates to. Provide requested information to allow us to get a better understanding of your request.

"Missing" Security Products?

If you cannot find the IBM Security product you are looking for then it is probably located in the IBM Security Private Ideas Portal. Check that site to open an idea.

Idea visibility

All ideas submitted via this portal are visible to all other portal users, though personal information fields remain hidden. If you would rather have your idea visible to only you and IBM then use the IBM Security Private Ideas Portal instead.

Please note: The purpose of the Ideas Portal is to tap the creativity of the IBM Security community so that we can enhance our products for everyone! If you need to report a defect or get help, please use our normal support channel. Click here to open a support ticket.

Want to see all of your IBM ideas in one place? Find them at



zSecure Admin

Showing 12 of 3481

z/OS Unix Access Report for Users or Groups

In zSecure, we can get an access report for a User or Group via the RA.3.4 panels. This report shows us what RACF resources an ID has access to, whether directly via the ID or via a connected Group (selecting option 2 in RA.3.4). Such a report cur...
4 months ago in zSecure Admin 0 Planned for future release

Allow the creation of SETUP Profiles within zSecure

We have multiple groups with various responsibilities that use zSecure. When I goto SE.D.1 for example to define my input files, I can only define what files everyone should be using. But I would like to define profiles like INQUIRY, ADMINISTRATIO...
6 months ago in zSecure Admin 0 Future consideration

Check the GLOBAL class on RA.1 Access Check

Option RA.1 : The command will show you the access level this user or group has through the access list, exits, and operations attribute. The GLOBAL class is not tested
7 months ago in zSecure Admin 0 Future consideration

Add option to AM.1 and AM.2 to filter out UserIDs that are REVOKED in current RACF DB

Provide an option to filter out UserIDs that are in REVOKE status in the current RACF DB.
8 months ago in zSecure Admin 0

Pleas add Cert. end to the panel C2RP3@#D in between "Dflt" and "Certificate name".

For key rings with lots and lots of certificates, this would keep us from listing each and every certificate to discover which one has just expired but has not made it to any report while the client is expressing urgency.
8 months ago in zSecure Admin 0 Future consideration

Ability to schedule changes for Users and Groups

When using zSecure Admin when you use options RA.R or RA.D you can administer Resources and Datasets. If you permit access to a Resource or a Dataset you will be presented with a confirmation screen. Option #4 on that screen lets you set a start/e...
9 months ago in zSecure Admin 0 Future consideration

RACF RLIST command for '*' profile

The RLIST command treats the asterisk as a wildcard. If a profile is named '*' then the command will list all profiles not just that one. Please enhance the RLIST command to allow the list of one specific profile especially a profile named '*'
10 months ago in zSecure Admin 1 Not under consideration

CKNSERVE should pick up changes to local system time dynamically

Currently CKNSERVE must be recycled to pick up a change in local system time, this is because "for reasons of code optimisation" IBM code picks up the timezone offset once at CKNSERVE startup, and not each time a message is written to CKNPRINT. We...
about 1 year ago in zSecure Admin 1 Future consideration

zSecure - Hour Granulartiy for REQUEST command

When requesting command execution in panel C2RP3XCS to get a connect to a group it is only possible to permit that access based on calendar days. Some privilege escalation should only be granted for a few hours instead of calendar days.
almost 3 years ago in zSecure Admin 1 Future consideration


We have some cases where our User Access Operations needs to set either a NONEXPiring password for a users or define the users with NOINTERVAL. Unfortunately this is not possible through the default RA.H panel.
about 3 years ago in zSecure Admin 1 Future consideration