Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Clear

Ideas

Showing 160 of 2953

User based data limit policy

When the same data limit policy is applied to various users, the inbound traffic byte counter is the sum of all the users included in the policy. So if one of them is reaching the limit. All the users of the policy are affected. Please, conside...
6 months ago in Sterling B2B Integrator / Security 5 Needs more information

Provide QueueWatch Audit data

As part of our effort to more thoroughly track usage in SBI, we need to be able to audit QueueWatch usage. In IBM case TS013772150, we were informed that this functionality does not exist.
about 2 years ago in Sterling B2B Integrator / Security 2 Future consideration

Support current SFTP/SSH host key and public key algorithms.

Sterling currently only supports ssh-rsa algorithm for host and public key. this is limiting sftp transfers with our new SFTP partners. New SFTP servers like Azure SFTP doesnt support ssh-rsa for host key algorithm. https://learn.microsoft.com/en-...
about 1 year ago in Sterling B2B Integrator / Security 1 Planned for future release

SSH host Key only allowing dsa and rsa

One of our 3rd parties mentioned that they were planning on doing a change to Host Key Algorithms to allow rsa-sha2-512 rsa-sha2-256 As more clients are moving to secure host keys we would prefer to have this option
almost 2 years ago in Sterling B2B Integrator / Security 1 Future consideration

Specify our desired default settings for Preferred Cipher and Preferred MAC Algorithm

When creating a new SSH Remote Profile, the Preferred Cipher and Preferred MAC fields are defaulting to values that are deprecated (blowfish-cbc and hmac-sha1). I was told that those deprecated settings are hardcoded in the B2Bi application. We wi...
over 1 year ago in Sterling B2B Integrator / Security 4 Functionality already exists

Manage Count Programs Through Store Engagement UI

Creating, updating, deleting and viewing Count Programs is inherently a business function that should be self-managed by store managers and store operations business users. Currently, there is no UI in Store Engagement to enable business users to ...
3 months ago in Store Engagement / Usability 1 Future consideration

Publish an event when inventory is moved between locations using move api

When inventory is moved between locations using API, we are not seeing a MoveCompleted event message being dropped as per the moveCompleted event. It would be good to have all moves between locations generate an event message, so that our event co...
6 months ago in Store Engagement / APIs & SDKs 1 Submitted

Password policy enforcement - minimum change password timeframe

To deny automated user's password change, add an additional parameter in password policy indicating the minimum number of days between a password is changed and the next time it can be changed.
almost 2 years ago in Sterling B2B Integrator / Security 1 Future consideration

Enhancing the Password Policy

No description provided
over 6 years ago in Sterling B2B Integrator / Security 3 Functionality already exists

PGP Encryption/Decryption of a file with multiple recipients

Trading Partners may encrypt a file using multi-recipient encryption. For instance, they may encrypt a file with our Public PGP key as well as their own key. When we receive that file, we should be able to decrypt using our private key. Symantec a...
almost 3 years ago in Sterling B2B Integrator / Security 1 Future consideration