This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
Beyond the scenario previously proposed; Idea is to feed you, from risk analysis standpoint, with different risks from our perspective. So, to help to understand better our point of view I can provide more cases or items to strengthen our concerns. As a reminder our concern are:
_ RACF don´t use "password rules" when a temporary expired password needs to be created. A "111" password could be created by Security Administrator. So, Expired passwords are easier to be discovered than definitive passwords.
_ RACF don´t limit attempts to create a first definitive password when it is expired
More cases or scenarios that expose above concerned items:
Hacker could dedicate to search new user's accounts with expired passwords recently created because system won´t revoke if it fails and will have infinite attempts. So, more chance to be hacked.
This risk is from the idea that Hacker knows the user id base and the concept of ZERO trust.
Hope this info helps to clarify our idea.
Thanks
Regards
Lucas E. Vaccaro
Logical Security RACF Admin.