Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

My ideas: Security

Showing 21

Provide QueueWatch Audit data

As part of our effort to more thoroughly track usage in SBI, we need to be able to audit QueueWatch usage. In IBM case TS013772150, we were informed that this functionality does not exist.
9 months ago in Sterling B2B Integrator / Security 2 Future consideration

SSH host Key only allowing dsa and rsa

One of our 3rd parties mentioned that they were planning on doing a change to Host Key Algorithms to allow rsa-sha2-512 rsa-sha2-256 As more clients are moving to secure host keys we would prefer to have this option
6 months ago in Sterling B2B Integrator / Security 1 Future consideration

Password policy enforcement - minimum change password timeframe

To deny automated user's password change, add an additional parameter in password policy indicating the minimum number of days between a password is changed and the next time it can be changed.
5 months ago in Sterling B2B Integrator / Security 1 Future consideration

CyberArk AAM Integration

We use CyberarkAAM with CCP to manage system to system logins, and have a requirement for rotating passwords. Currently no where in SBI (properties files, sandbox, partner setups, etc) has the ability to setup outbound connections with rotating pa...
3 months ago in Sterling B2B Integrator / Security 1 Future consideration

security JDK modification to allow addition of ciphers for SI connecting to ldap

At the moment SI product wont allow it and for SDS (ldap) product remediation more strong ciphers has to be added with guidelines from CSO so intention was matching to all those ciphers on SI side. This would benefit everyone to matchup with secur...
7 months ago in Sterling B2B Integrator / Security 1 Future consideration

Internal system required certificates prevention

We received the alert for expired certificate in email. We mistakenly removed the expired document encryption cert doccrypto2. After we worked with the support and we found out this cert is required and even it is expired. Our problem is if this i...
over 1 year ago in Sterling B2B Integrator / Security 0 Future consideration

PGP Encryption/Decryption of a file with multiple recipients

Trading Partners may encrypt a file using multi-recipient encryption. For instance, they may encrypt a file with our Public PGP key as well as their own key. When we receive that file, we should be able to decrypt using our private key. Symantec a...
over 1 year ago in Sterling B2B Integrator / Security 0 Future consideration

Native PGP - Interface level compression setting

In other PGP software you can alter the compression algorithm. In the case of Native PGP, we can only change compression at a global level. Down the road, if a partner requires a certain compression algorithm other than the global one that’s set, ...
about 1 year ago in Sterling B2B Integrator / Security 0 Future consideration

HTTP access log with URL, status code, IP's, user agent string, etc.

Security frequently audits to review the HTTP access logs for web server of Sterling Application (external facing apps). Security expect the HTTP access log to reflect the URL, status code, IP's, user agent string, etc. Can you suggest where to tr...
almost 2 years ago in Sterling B2B Integrator / Security 1 Future consideration

Audit record/log for the SQL statement executed via db_exec.sh and db_execFile.sh scripts

Hi Team, Currently in Sterling B2B Integrator there is no audit records/logs for the SQL statements executed via scripts db_exec.sh and db_execFile.sh. We have verified the logs and ADMIN_AUDIT table and could not find any audit trial for the SQL ...
over 1 year ago in Sterling B2B Integrator / Security 0 Future consideration