Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Security

Showing 70

Provide QueueWatch Audit data

As part of our effort to more thoroughly track usage in SBI, we need to be able to audit QueueWatch usage. In IBM case TS013772150, we were informed that this functionality does not exist.
over 1 year ago in Sterling B2B Integrator / Security 2 Future consideration

Specify our desired default settings for Preferred Cipher and Preferred MAC Algorithm

When creating a new SSH Remote Profile, the Preferred Cipher and Preferred MAC fields are defaulting to values that are deprecated (blowfish-cbc and hmac-sha1). I was told that those deprecated settings are hardcoded in the B2Bi application. We wi...
9 months ago in Sterling B2B Integrator / Security 1 Future consideration

SSH host Key only allowing dsa and rsa

One of our 3rd parties mentioned that they were planning on doing a change to Host Key Algorithms to allow rsa-sha2-512 rsa-sha2-256 As more clients are moving to secure host keys we would prefer to have this option
about 1 year ago in Sterling B2B Integrator / Security 1 Future consideration

We need to a native support of OpenSSL encryption as we have for PGP

Banks needs different ways to enrypt files at rest, and they need native support from the sterling solution instead of using CLI adaprter or other mehods
3 months ago in Sterling B2B Integrator / Security 0 Submitted

FTP/SFTP File and Folder permissions

File and Folder permissions for FTP and SFTP appear to be at the server-level, forcing NTFS security. This isn't necessarily negative, however if we change these permissions, we risk breaking other processes on the server when we only want to allo...
about 2 months ago in Sterling B2B Integrator / Security 0 Submitted

Password policy enforcement - minimum change password timeframe

To deny automated user's password change, add an additional parameter in password policy indicating the minimum number of days between a password is changed and the next time it can be changed.
about 1 year ago in Sterling B2B Integrator / Security 1 Future consideration

Have the ability to import a public and secret key ring into native PGP for B2Bi.

I believe that this functionality would be useful for the user community to be able to import an entire key ring (both public and secret) instead of having to import the keys individually.
8 months ago in Sterling B2B Integrator / Security 2 Functionality already exists

Java LTS - SI/B2BI needs a defined roadmap plan for Java Long Term Support adoption (e.g. Java 11 & Java 17)

A path and solid timeline for upgraded Java Long Term Support version adoption needs to be defined for the entire suite of IBM Sterling products. Information Risk Management teams and groups are requiring all applications to migrate and leverage u...
over 1 year ago in Sterling B2B Integrator / Security 3

Information systems which implement HTML 5 must adhere to the HTML 5 Security Standard.

Information systems which implement HTML 5 must adhere to the HTML 5 Security Standard. Changes to any other properties for the purpose of preventing cross-site vulnerabilities are not supported. Reference: https://www.ibm.com/docs/en/b2b-integrat...
2 months ago in Sterling B2B Integrator / Security 2 Needs more information

All input (user and service) must be validated on the server side to permit only the allowed characters and limited field length necessary for the corresponding function.

All input (user and service) must be validated on the server side to permit only the allowed characters and limited field length necessary for the corresponding function.
2 months ago in Sterling B2B Integrator / Security 1 Needs more information