Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
IBM is transforming its request for enhancement (RFE) process. The purpose of the transformation is to provide a more consistent experience for you to submit requests and to enable IBM product owners to respond to your requests more quickly. For more information click here.
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
1. Post an idea
2. Upvote ideas that matter most to you
3. Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notifications on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Inheritance of shared global mailbox privileges
Need the ability for accounts to automatically be granted access to submailboxes when these accounts are granted access to another account's mailbox. Example - User 1 is given access to user2's mailbox. Need the ability for user 1 to automatically...
Ability to correlate deferred documents with the ST control number assigned to them at time of enveloping
For each document that we process and defer, we lose track of the specific control numbers that are assigned at the time of enveloping. For instance, if you defer 5 separate documents at various times and later run enveloping, we need a method to ...
TELNET Check Button :: To check if partner had White-listed/allowing our IP address
Currently, when configuring AS2 profile for partner, we will have to go back to partner and check whether his firewall team had white-listed our IP address if we are unable to connect to their server. This can be known only after we start with the...
Being able to pull the inbox and outbox view with the filename
We have had several customers ask for the option of the filename being able to be reported and downloaded in the excel file. Customer's cross check IBM VAN with their internal system with filenames.
Support for Windows Server 2022
Would like to request getting support for Windows Server 2022 as soon as possible please.
Require MEIG to perform certificate matching on unique values
In a scenario where multiple CA certificates having the same value for the DN Subject parameter exist in the database, MEIG can retrieve the wrong CA certificate and cause a valid Trading Partner certificate to incorrectly be interpreted as invali...
Control Center Rule Correlation
Two of the things we utilize Control Center for is SLC notification and processes that do not end successfully. We have some transmissions that are monitored on SLCs that are contractual (sla). We do get an alert if the sla transmission has not st...
Show actual SFTP error in status report
Sterling 6.0 and up, in some cases, has replaced useful, specific SFTP error messages in the status report with vague ones that require diving into logs to troubleshoot. For example, if the host key is wrong when connecting to a partner, this is w...
Mask or Don't Include Passwords In Connect Direct Process Scripts that have been built in Connect Direct Web Services or Connect Direct Browser UI
Currently when a user builds a process in CDWS or CD Browser UI, the password is in plain text if a pnode/snode ID is used with password. This is a security vulnerability and should be addressed. We realize that there is no way to stop a user from...
Configuring the SEAS to only respond with (UserID & Destination Indicator) in response to SSP and forward the Authentication request (Password/SSH Key) aganist/to Sterling integrator local store?
The process/flow will follow the below steps from (User to SSP to SEAS to SI) Step 1 - User Authentication request comes from SSP layer to SEAS; Step 2 - SEAS validates the user against connected AD and return only "UserID/Username && Dest...
Do not place IBM confidential, company confidential, or personal information into any field.