This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
Ability to invoke a BP in a specific queue other than its default queue
In order to prioritize processing of certain transactions over others in common BP's it would be useful if we were able to specify a specific queue for an Async BP to be invoked in rather than have it invoked in its default queue.
We have a requirement which needs your help with the possible solutions from the Sterling Secure Proxy application with minimal impact (post deployment). Here is the requirement: There is a portal called Connect portal where partners login with th...
Add Description field to API for Windows netmap add
The API in Connect:Direct Web Services does not allow for a 'Description' field when using the API for netmap adds. For Windows, it requires a separate API to accomplish this. The API for UNIX netmap adds has the Description field, so having the f...
Monitored File Agents - Notification needed for "error in container"
The File Agent CDFA.log reports "error in container" messages in the log. We would like an associated message ID to be assigned to this so that a Control Center email notification can be set up. This will help our team clean up various File Agents...
Strip LDAP syntax from SEAS return data and return just the values
PEM/PCM requires each user to have a “role”. When LDAP is integrated with PCM, the “role” is obtained as a mapping from an LDAP attribute value. Enterprise customers with an enterprise Microsoft Active Directory schema can be constrained from usin...
myFG2.0 deployment on multiple HTTP Server Adapter
myfilegateway1.0 can be hosted on different http server adapters and that helps to split the traffic and achieve high availability but the same is not possible with mfg2.0, updated version of myfg2.0 should have same flexibility as old version of ...
In Secure Proxy GUI you can examine the status of the adapters by going to Monitoring-> Engine Status(ALL) -> Engine Name and see whether each adapter is running. This functionality is not present in the REST API. You can lookup the configur...
Support to update trading partner (partner profile) data or ask to remove their data or configuration in SFG
Based a regulations like GDPR and LGPD customer needs do provide to their trading partners the option to update the trading partner profile thru myFG 2.0 or even an option to remove or download their data.
Allow File Agent user to become another account as specific folders are owned by different accounts. A little history, we were using some product to monitor files for different directories, the product allowed us to become another user to pick up ...
Compliance for SWIFT members with MFA for internal users
In relation to the SWIFT Customer Security Programme, the Customer Security Controls Framework V2023, there is a mandatory requirement for relevant in scope components to implement and maintain Multi-Factor Authentication when internal operators’ ...
Do not place IBM confidential, company confidential, or personal information into any field.