Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

FILTER BY CATEGORY

Security

Showing 48

Change security logs format

The security logs can be changed to display more information in a single line. It will help security teams to identify who creates/deletes users or groups.
over 2 years ago in Sterling B2B Integrator / Security 1 Not under consideration

Allow email address to use as user ID

We have requirement to use email address as the user ID in sterling integrator.
over 2 years ago in Sterling B2B Integrator / Security 0 Planned for future release

PGP Encryption/Decryption of a file with multiple recipients

Trading Partners may encrypt a file using multi-recipient encryption. For instance, they may encrypt a file with our Public PGP key as well as their own key. When we receive that file, we should be able to decrypt using our private key. Symantec a...
about 1 year ago in Sterling B2B Integrator / Security 0 Future consideration

Multi Factor Authentication for Administrator accounts

Need to be able to require Multi Factor Authentication for administrative accounts in B2BI, SSPCM, SEAS.
over 1 year ago in Sterling B2B Integrator / Security 0 Not under consideration

RestAPI support for Token Authentication rather than Basic Authentication

Looking for a future service availability to support Token Authentication, either with RestAPI or new one. As per my conversation with an IBM engineer on another troubleshooting call; support of Token Authentication by RestAPI is planned in future...
over 2 years ago in Sterling B2B Integrator / Security 0 Future consideration

Password policy enforcement - minimum change password timeframe

To deny automated user's password change, add an additional parameter in password policy indicating the minimum number of days between a password is changed and the next time it can be changed.
6 days ago in Sterling B2B Integrator / Security 0 Submitted

SSH host Key only allowing dsa and rsa

One of our 3rd parties mentioned that they were planning on doing a change to Host Key Algorithms to allow rsa-sha2-512 rsa-sha2-256 As more clients are moving to secure host keys we would prefer to have this option
23 days ago in Sterling B2B Integrator / Security 0 Submitted

Allow segregation of administrators to discrete lists of trading partners

Our organization has multiple business units. We need the ability to assign administrators so that they can make changes to only those accounts assigned to their business unit. Example - Trading partners A, B, and C are assigned to business unit A...
over 1 year ago in Sterling B2B Integrator / Security 0 Not under consideration

Show source IP and user in log for ALL attempts

It is useful to scan logs with security tools to look for patterns in brute force access to the B2B Integrator instance. None of the logs today contain the real source IP of connection attempts. Only certain logs show the perimeter server IP the r...
3 months ago in Sterling B2B Integrator / Security 1 Functionality already exists

HTTP access log with URL, status code, IP's, user agent string, etc.

Security frequently audits to review the HTTP access logs for web server of Sterling Application (external facing apps). Security expect the HTTP access log to reflect the URL, status code, IP's, user agent string, etc. Can you suggest where to tr...
over 1 year ago in Sterling B2B Integrator / Security 1 Future consideration