This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
I recommend a slight modification to this idea. Have ALTER access allow setting passwords for PROTECTED IDs but only with resources IRR.PWRESET.TREE | .GROUP so that the scope of this authority can be restricted. IRR.PWRESET.EXCLUDE resources could further limit the scope.
As this has been requested longer ago it would be nice to get a clearer status whether it has a chance to get implemented within a shorter time range. Can you provide such a clearer status? Many thanks in advance...
Please be so kind and let me know a further status, as the customer ask me sometimes about it. Thanks.
The colleague from the original PMR asked me for a more detailed status. As I do not have direct contact to development I only can add a further comment here. He would like to see some progress as the status "Uncommitted Candidate" is seen for a long time already and no update happened since Nov 16, 2016.
Is there a time period that we can expect a new update or can the status be kept without update for a terribly long time and if so how long can it be?
Many thanks in advance for a short explanation on this.
Several comments have been added in the meantime, including mine on 24 Oct 2016. I meant this comment as being more information but the status of the RFE does not change from "Need more information". So, what exactly do you need and how to provide it? I thought that a comment is the right and only way. Can you give me some clarification on this? Many thanks in advance...
Thanks for your update. All what you wrote is clear and accepted. But the customer asked for a solution, and from my point of view it should be possible for a security team like us (my team) is able to delegate to activate protected users as well without system special authority. And exactly this is missing. Therefor the suggestion. If there is no need to delegate this functionality, we must not use alter access to the profile.
We are talking about a really very large account with a lot of systems. The problem is, the protected attribute and so the user help desk (they are a lot of people) have authorization by IRR.PASSWORD.RESET Profile.
The Customer process is, when userids have been defined with ADDUSER procedure, the user help desk have to set a initial password. But they can not do it. And we can not give all people of the team special or group special.
From my point of view the security team should be able to give needed authorization by the Facility profile as well for protected user. This makes sense from my point of view. Thanks.
Eliminating the security exposure in z/OS V2R2 was excellent, of course. Changing the the processing for creating new IDs is not that easy as it is a combination of an automated process (where the installation does not want add explicit temporary passwords) and setting a temporary password in a next step by people being authorized as low as possible. This processing could be continued to be used when accepting this small request.
Note that prior to V2R2, adding a user without specifying a password did not define a user without a password, the user's password defaulted to the name of his or her default group. This was a security exposure which we eliminated in V2R2. Have you considered updating your procedures to specify a password at ADDUSER time? This password will also be expired like one set by a HELP desk person with IRR.PASSWORD.RESET authority. We believe that specifying ADDUSER with an expired password is no less secure than requiring the user to contact the HELP desk to get one assigned.
Creating a new RFE based on Community RFE #95051 in product z/OS.