Skip to Main Content
Cloud Platform

Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Post your ideas

Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,

  1. Post an idea

  2. Upvote ideas that matter most to you

  3. Get feedback from the IBM team to refine your idea

Help IBM prioritize your ideas and requests

The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.

Receive a notification on the decision

Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.

If you encounter any issues accessing the Ideas portals, please send email describing the issue to for resolution.

For more information about IBM's Ideas program visit

Status Future consideration
Workspace WebSphere Liberty
Created by Guest
Created on Dec 22, 2020

Allow usage of z/OSMF JWT tokens by multiple sessions using the same user ID

We are using new APIs to obtain JWT tokens (/zosmf/services/authenticate) from our automated scripts that use other z/OSMF REST APIs with the obtained. After the script completes, it calls the DELETE method to invalidate the token that it obtained. When there are multiple scripts running at the same time or a person using a web UI with the same credentials, the DELETE method or logout will invalidate all the sessions and the scripts fail.

It seems that the JWT token that is returned for the exact values of user ID and password are all always the same so the logout (DELETE) done by the client, invalidates tokens that other clients have. It prevents reliable programmatic usage of z/OSMF REST API from programmatic API clients because the token obtained by one client can be invalidated by another one. It seems as unexpected behavior since using a different case (e.g. ?uSeRiD? or ?USERID ? instead of ?USERID?) or different PassTickets leads to different JWT tokens that are not invalidated by the DELETE method on other JWT tokens for the same user.

The requested behavior that is present in other software that generates JWT tokens is to generate different tokens for each login request (i.e. each session).

Since the tokens are used from independent sessions (different script, or web UI), we would expect that the POST /zosmf/services/authenticate will return different tokens for different sessions and the DELETE will delete just the token for one session. The expiration should be the configured duration from the moment of the request.

We agree that there can be a use case to invalidate all tokens of a user. The current behavior does not achieve that since tokens.

The expected behavior (different tokens for each POST request) is important for using REST API programmatically from multiple applications at the same time. Current behavior makes the usage of JWTs problematic because they can be invalidated at any moment by another application that is using them.

There is no good workaround for the problem. If the script does not use DELETE itself, there can be other scripts that call it.

Idea priority Medium
RFE ID 147555
RFE Product WebSphere Application Server