Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
IBM is transforming its request for enhancement (RFE) process. The purpose of the transformation is to provide a more consistent experience for you to submit requests and to enable IBM product owners to respond to your requests more quickly. For more information click here.
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
1. Post an idea
2. Upvote ideas that matter most to you
3. Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notifications on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Provide control over who can use the SNODEID parameter
This idea was previously raised for CDz CONDIRECTZ-I-8, however, it was informed by CDz L3 that the enhancement in CDz will not be able to work on remote Distributed CD nodes. Therefore, this request is raised for similar function on distributed p...
Mask or Don't Include Passwords In Connect Direct Process Scripts that have been built in Connect Direct Web Services or Connect Direct Browser UI
Currently when a user builds a process in CDWS or CD Browser UI, the password is in plain text if a pnode/snode ID is used with password. This is a security vulnerability and should be addressed. We realize that there is no way to stop a user fr...
synchronize the versions of JRE in Connect Direct
Install agent is packaged with an older version of Java with numerous security vulnerabilities. Main java : $ ./jre/ibm-java-x86_64-80/jre/bin/java -version
java version "1.8.0_261"
Java(TM) SE Runtime Environment (build 184.108.40.206 - pxa6480sr6fp15-...
CIphers configuration for Connect Direct Web Services
Connect Direct Web Services configuration should allow to limit list of allowed ciphers. Similar functionality is present for protocol configuration under "server.ssl.enabled-protocols”. Support for similar parameter e.g. "server.ssl.enabled-ciph...
Option to disable Connect Direct Web Services web page
Current version of Connect Direct Web Services software provides two interfaces - RESTful API and webpage GUI access. Software should allow to disable web GUI access.
Add cipher support
Need to connect to a wide variety of Customers.
TLS_RSA_WITH_AES_256_CCM (0xC0,0x9D)TLS_DHE_RSA_WITH_AES_128_CCM (0xC0,0x9E)TLS_DHE_RSA_WITH_AES_256_CCM (0xC0,0x9F)TLS_RSA_WITH_AES_128_CCM_8 (0xC0,0xA0)TLS_RSA_WITH_AES_256_CCM_8 (0xC0,0xA...
certificate-based authentication support for CDAIJ and CDW
Many customers from banks need to change their OS users' password every 1 or 3 months for all OS according to their security regulation which means all applications or middleware using the old password must change at the same time. For customers,...
Auditing Feature to iSeries C:D
Good Afternoon, i would like to see the auditing feature in your current product Sterling Gentran being added to Sterling Connect Direct.
Capture x509 SSL Exp Dates for Adjacent Nodes
Currently, we cannot find the x.509 Exp Dates in the Copy Termination records for our adjacent nodes. We would like to be able to report on upcoming expired certs for our business partners via an Activity Report.
Connect:Direct Win/Unix Interface to Cyberark or other Priviledged Account Solutions
If a PAM-tool like Cyberark is in use, users don't have real logon-credentials for Windows- or Unix-Server any more; these are maintained by Cyberark.
Do not place IBM confidential, company confidential, or personal information into any field.