This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
PGP Encryption/Decryption of a file with multiple recipients
Trading Partners may encrypt a file using multi-recipient encryption. For instance, they may encrypt a file with our Public PGP key as well as their own key. When we receive that file, we should be able to decrypt using our private key. Symantec a...
RestAPI support for Token Authentication rather than Basic Authentication
Looking for a future service availability to support Token Authentication, either with RestAPI or new one. As per my conversation with an IBM engineer on another troubleshooting call; support of Token Authentication by RestAPI is planned in future...
Allow segregation of administrators to discrete lists of trading partners
Our organization has multiple business units. We need the ability to assign administrators so that they can make changes to only those accounts assigned to their business unit. Example - Trading partners A, B, and C are assigned to business unit A...
HTTP access log with URL, status code, IP's, user agent string, etc.
Security frequently audits to review the HTTP access logs for web server of Sterling Application (external facing apps). Security expect the HTTP access log to reflect the URL, status code, IP's, user agent string, etc. Can you suggest where to tr...
It is useful to scan logs with security tools to look for patterns in brute force access to the B2B Integrator instance. None of the logs today contain the real source IP of connection attempts. Only certain logs show the perimeter server IP the r...
Do not place IBM confidential, company confidential, or personal information into any field.