Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Post your ideas
IBM is transforming its request for enhancement (RFE) process. The purpose of the transformation is to provide a more consistent experience for you to submit requests and to enable IBM product owners to respond to your requests more quickly. For more information click here.
Start by posting ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
1. Post an idea
2. Upvote ideas that matter most to you
3. Get feedback from the IBM team to refine your idea
Help IBM prioritize your ideas and requests
The IBM team may need your help to refine the ideas so they may ask for more information or feedback. The offering manager team will then decide if they can begin working on your idea. If they can start during the next development cycle, they will put the idea on the priority list. Each team at IBM works on a different schedule, where some ideas can be implemented right away, others may be placed on a different schedule.
Receive notifications on the decision
Some ideas can be implemented at IBM, while others may not fit within the development plans for the product. In either case, the team will let you know as soon as possible. In some cases, we may be able to find alternatives for ideas which cannot be implemented in a reasonable time.
Display SNode User ID (SNODEID) value in log fetched via SCC or CD API
Information about used SNODEID (SNode User ID) option is present in log displayed in CD Requested and "direct.exe" CLI but it is not displayed in SCC or via CD API (JAI). Please extend SCC and CD API to display SNODEID option usage.
Add the Tag Mapping Labels to the Search Filter
Control Center 126.96.36.199 iFix03. When you create a tag mapping and tag label, the label only displays in the view column. When you select the add filter, the drop down displays as Tag1 Tag2 etc. So only administrator of the application know what the...
Any configuration information stored in the CCM database must be encrypted
Requirement stated by customer that all configured objects in the database must be encrypted. This includes audit information and any information containing IPs, host names and passwords. Whole-disk encryption, SAN storage encryption, and database...
Add TLS 1.3 Support to IBM Control Center
Display actual time instead of elapsed time for recent completed transfers
When trying to pinpoint when a transfer happened for troubleshooting, or any other reason, it would be a lot better if the time was displayed instead of 47 minutes ago or 2 hours ago...
Add the ability to delete expired Secure+ certificates
When there are several hundred servers with expired certificates, it's extremely time consuming to log into each individual C:D node to manually deleted the certificate. The ability to delete old/expired certificates from Control Center will simpl...
Report to pull last accessed/last login time for all partners
There seems to be a lack of reporting on historical activity of users/partners in Sterling to be able to determine if an account is active and when it was last active. I'm currently trying to pull a last login/last accessed timestamp for each user...
Add DVG and submitter ID fields to All File Transfer Services APIs in Control Center 6.1
Requesting to add submitter and data visibility group (DVG) to all file transfer services APIs, especially Get Completed Files List and Read FileTransfers. Current APIs are limited and there is no way to restrict the return results per partner/sub...
Automated Cognos reconfiguration for High Availability
Installing ICC in a High Availability environment requires steps taken to reconfigure Cognos as detailed here:
Let Control Center have the ability to monitor critical database system events on a monitored SI server
Today, if a B2BI node looses its connection to the database server, it sends out an email. I would like Control Center to have the ability to detect if that event has occurred and send out an alert.
Do not place IBM confidential, company confidential, or personal information into any field.