This portal is to open public enhancement requests against products and services offered by the IBM Data Platform organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Specific links you will want to bookmark for future use
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
IBM Employees should enter Ideas at https://ideas.ibm.com
Agree with the security comments already attached here. That is the biggest reason, as this keeps us from being able to properly secure files and files for users, since the UID is what is generated on the operating system, instead of an actual user id. Thus, our access management systems are unable to be leveraged to manage the security access and folder permissions within the platform to keep the data secure between multiple users.
This also has security relevance.
WSL assigns its own numbers to users - those numbers manifest themselves as operating system userids in the file system backing the user-home PVC. Thus existing operating system users on the system providing the backing storage could overlap with those numbers and by this gain access to private/confidential data.
An integration with the central user/userid managemnt like requested would prevent this.
Therefore the requested 'high' priority is backed also by this security reason.