Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
IBM is transforming its request for enhancement (RFE) process. The purpose of the transformation is to provide a more consistent experience for you to submit requests and to enable IBM product owners to respond to your requests more quickly. For more information click here.
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
1. Post an idea
2. Upvote ideas that matter most to you
3. Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notifications on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Develop SEAS to intelligently query for IPs that come from a subnet and allow them in if that subnet is in an LDAP attribute
Why useful? Useful because these days a lot of trading partners are coming from cloud environments that aren't front-ended by one (or a handful) IP address. Who benefits? Anyone who desires to whitelist IPs as a means of authentication or just as ...
Enable myFileGateway multi-factor authentication. Different fields be added for token and password
Enable different fields to be added in the Login's Page for myFilegateway.
We need to receive an extra field during login authentication on myFileGateway, as a random Token for example.
Using pre-login Exit...
Make component rules validation optional, just as it is the case with restriction lists
In WTX, when running a map, there's an option to avoid validating restriction lists. Having the same option for component rules could be useful in some cases.
SCC does not capture SFG Custom Events
Hi, We have installed ICC 6.1 and we are creating a portal kind of monitoring stuff to monitor all SFG files in ICC Console ( File Monitor). We have created custom events to track additional data in SFG. There are some fields we want to capture fr...
Looping Functionality for Dialogs (UI, API, XSLT)
Many times it is not possible to know the number of times that you need an API to execute. Looping would allow the execution of an API or UI dialog to be dynamic. This could be utilized in a great number of use cases, one of which I outlined below.
Reorganize the catalog in Call Center
When we load a catalog to Sterling, the items are not in the correct size order, but there is no way to manually reorder or set up a customization to organize these sizes. Therefore, when a user is trying to select a size they have to look through...
Enhance REST API Client service to allow connection via DMZ / Perimeter server
Currently REST API Client service can establish connection to REST API endpoint via local perimeter or proxy only. This presents an issue while connecting to external partners. Request is to enhance REST API Client service to allow configuration f...
Setting in the optimizer to value 1 node over others
As a user I would like a way to move allocation to one node over another. This can be a feature that we would use when we might want to have one node be used more or less during a given time
Enable Adhoc Email Link for file downloads without User Login Credentials
This is a business need with most enterprise's we have had conversation. While we have stressed on the aspect of Security concerns and its impact. The clients have strongly evinced interest for this capability as the dependency is high on IT and T...
Allow customization of LDAP ping "dummy" user
It is possible to configure a periodic "heartbeat" that checks the connection to External Auth, and it is also possible to have it attempt an LDAP bind (via the ea.ping.profile setting). However, when it does this LDAP bind, it uses a fake user ("...
Do not place IBM confidential, company confidential, or personal information into any field.