Skip to Main Content
IBM Z Hardware and Operating Systems Ideas Portal


This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Not under consideration
Workspace z/OS
Categories RACF
Created by Guest
Created on Sep 27, 2016

Simplify ADDUSER support with ALTER access to IRR.PASSWORD.RESET

As described in the PMR the installation is used to define new users without password and set an initial password later by support users having read access to FACILITY profile IRR.PASSWORD.RESET. Beginning with z/OS V2R2 such users are defined as protected users for safety reasons. The problem now is that read access to FACILITY profile IRR.PASSWORD.RESET does not allow this for protected userids.

Therefore, the idea is to extend the authorization on ALTUSER for a password or password phrase reset if the user has ALTER access to this profile.

Idea priority High
  • Guest
    Reply
    |
    Mar 13, 2024
    This item is a valid requirement but unlikely to be given high enough priority to be placed into the product plan. If this requirement is high value, please re-open it, or open a new requirement.
  • Guest
    Reply
    |
    Nov 20, 2023

    I recommend a slight modification to this idea. Have ALTER access allow setting passwords for PROTECTED IDs but only with resources IRR.PWRESET.TREE | .GROUP so that the scope of this authority can be restricted. IRR.PWRESET.EXCLUDE resources could further limit the scope.

  • Guest
    Reply
    |
    Dec 8, 2017

    As this has been requested longer ago it would be nice to get a clearer status whether it has a chance to get implemented within a shorter time range. Can you provide such a clearer status? Many thanks in advance...

  • Guest
    Reply
    |
    May 8, 2017

    Please be so kind and let me know a further status, as the customer ask me sometimes about it. Thanks.

  • Guest
    Reply
    |
    Mar 22, 2017

    The colleague from the original PMR asked me for a more detailed status. As I do not have direct contact to development I only can add a further comment here. He would like to see some progress as the status "Uncommitted Candidate" is seen for a long time already and no update happened since Nov 16, 2016.
    Is there a time period that we can expect a new update or can the status be kept without update for a terribly long time and if so how long can it be?
    Many thanks in advance for a short explanation on this.

  • Guest
    Reply
    |
    Nov 16, 2016

    Several comments have been added in the meantime, including mine on 24 Oct 2016. I meant this comment as being more information but the status of the RFE does not change from "Need more information". So, what exactly do you need and how to provide it? I thought that a comment is the right and only way. Can you give me some clarification on this? Many thanks in advance...

  • Guest
    Reply
    |
    Oct 27, 2016

    Thanks for your update. All what you wrote is clear and accepted. But the customer asked for a solution, and from my point of view it should be possible for a security team like us (my team) is able to delegate to activate protected users as well without system special authority. And exactly this is missing. Therefor the suggestion. If there is no need to delegate this functionality, we must not use alter access to the profile.

  • Guest
    Reply
    |
    Oct 25, 2016

    We are talking about a really very large account with a lot of systems. The problem is, the protected attribute and so the user help desk (they are a lot of people) have authorization by IRR.PASSWORD.RESET Profile.
    The Customer process is, when userids have been defined with ADDUSER procedure, the user help desk have to set a initial password. But they can not do it. And we can not give all people of the team special or group special.
    From my point of view the security team should be able to give needed authorization by the Facility profile as well for protected user. This makes sense from my point of view. Thanks.

  • Guest
    Reply
    |
    Oct 24, 2016

    Eliminating the security exposure in z/OS V2R2 was excellent, of course. Changing the the processing for creating new IDs is not that easy as it is a combination of an automated process (where the installation does not want add explicit temporary passwords) and setting a temporary password in a next step by people being authorized as low as possible. This processing could be continued to be used when accepting this small request.

  • Guest
    Reply
    |
    Oct 20, 2016

    Note that prior to V2R2, adding a user without specifying a password did not define a user without a password, the user's password defaulted to the name of his or her default group. This was a security exposure which we eliminated in V2R2. Have you considered updating your procedures to specify a password at ADDUSER time? This password will also be expired like one set by a HELP desk person with IRR.PASSWORD.RESET authority. We believe that specifying ADDUSER with an expired password is no less secure than requiring the user to contact the HELP desk to get one assigned.

  • Guest
    Reply
    |
    Sep 28, 2016

    Creating a new RFE based on Community RFE #95051 in product z/OS.