Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
IBM is transforming its request for enhancement (RFE) process. The purpose of the transformation is to provide a more consistent experience for you to submit requests and to enable IBM product owners to respond to your requests more quickly. For more information click here.
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
1. Post an idea
2. Upvote ideas that matter most to you
3. Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notifications on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Allow Workflow to Continue After API has Failed
When creating an API dialog there should be an option to continue workflow even when the API fails. Preferably, it would have conditions to continue based upon what error is received.
Ad Hoc Report Functionality
In version 6.1.3 and earlier when a report is run, the user has the option to keep/download in different versions such as pdf, xls, csv, etc and to email the report. However, in version 6.2, this ad hoc functionality has been removed. While an ad ...
Enable authentication by token on the Sterling B2B REST API
Seems like currently the B2B REST API only supports authentication of basic type, where username/password is sent in header of get/post/put HTTP call. Can there be a mechanism to authenticate via bearer token? Thanks very much!
Allow PS log file name to be configured with standard name
Currently the PS log file name is like PS.Logger.Dyyyymmmdd.Thhmmss. It should be configurable and follow the same name convention as what's used in CM and SSP etc.
Ability to Search 3+ Sender/Receiver ID's in New InFlight
Currently in New Inflight it is not possible to search or preclude different Sender / Receiver ID's. This would allow the client to search for results across many Different ID rather than have to search each ID one at a time, this saving time.
Provide a read-only role for the Partner Repository
We'd like to be able to provide sponsor users who are not admins a way to have read-only access to the items in the Partner Repository, such as Code Lists, Generic Data, etc.
More algorithms support for diffie-hellman
Understand that current supported SSH Key Exchange Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1
However, is it possible to support more diffie-hellman algorithm?
Sterling External Authentication server (SEAS) Admin UI needs to be ported over from thick to Web client
System : Sterling External Authentication server (SEAS) Actor : MFT Administrators Presently to setup, install and configure SEAS we need to use Java thick client which is a Java WS application connecting on non-standard ports and requiring a Wind...
Feature of Looping to be incorporated on Tasks/Dialogs/API calls etc
Feature of Looping needs to be added on Tasks/Dialogs/API calls etc. Instead of stretching the current flows statically, it is always advisable to have dynamic looping feature, which would make the flows scalable. It not only makes the flow scalab...
Single Sign On for PEM
Support Single Sign On for PEM to allow integration with identity management systems. This critical to comply with security requirements and verify user/partner identity. From a user experience, this is needed to provide a more seamless client/par...
Do not place IBM confidential, company confidential, or personal information into any field.