Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Clear

Pinned ideas

PINNED Present Multiple Host Keys - RSA and ECDSA
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...

Ideas

Showing 154 of 2967

Option for TLSv1.1 or Higher in FTPS Netmap

Request to either add an option for TLSv1.1 or higher under FTPS netmap > Security > Secure Connection > Security Setting for a FTPS adapter, or remove SSLv3 and TLSv1 from the "SSLv3, TLSv1, TLSv1.1, or TLSv1.2" option under the same loc...
almost 8 years ago in Sterling Secure Proxy / Security 0 Not under consideration

Add successful security handshake information to the audit log

Add information to the SSP audit log regarding what was negotiated during a successful security handshake. For SSL/TLS this would include the protocol version(SSLv3.0, TLSv1.0, etc.), the cipher agreed upon and the client source IP. For SFTP/SSH t...
almost 8 years ago in Sterling Secure Proxy / Other 0 Future consideration

Ability to add custom HTTP headers for PEM application

Due to security concerns, security team likes to have custom HTTP headers in all HTTP traffic. Request you to please add a new feature is to be able to configure HTTP header for PEM application. This is required to get CA signed certificates from ...
over 3 years ago in Sterling Partner Engagement Manager / Security 1 Future consideration

Limit Secure Proxy sessions by inbound IP address

We want the ability to limit inbound sessions per IP address at the adapter level. We don't want to maintain inbound IP addresses in SSP but we would like SSP to be intelligent enough to realize when an external inbound IP is consuming X number of...
almost 8 years ago in Sterling Secure Proxy / Performance 0 Not under consideration

Refresh Token provided in HTTP Headers

Current situation: The OpenID Connect refresh token is sent as a GET parameter to the webservers of pem-pp and pem-pr applications so the refresh token is showed in the URL history of the browser/sniffer traffic: Example: GET/rochesso/home?refresh...
about 2 years ago in Sterling Partner Engagement Manager / Security 0 Under review

Use Refresh token rotation to make Jwt token more secure

Current Situation: An access token allows temporary access to restricted resources, PEM APIs, and so has a short validity period of 5 minutes (configurable through system properties). A refresh token has a longer validity as it allows users to log...
about 2 years ago in Sterling Partner Engagement Manager / Security 0 Under review

Multiple Configuration Managers supporting proxy/perimeter servers

Currently SSPcm is a single point of failure since only 1 instance can manage a set of proxies. If the one instance goes offline, the proxies being managed a stop functioning correctly
over 6 years ago in Sterling Secure Proxy 0 Future consideration

Modify configureCmSsl.sh and configureEngineSsl.sh to allow for command line paramter passing

the current scripts allow for some parameters to be passed, but when exporting a CM configuration, you must always supply a second passphrase for the encryption of the exported xml file. This parameter cannot be passed without feeding it from your...
about 2 years ago in Sterling Secure Proxy / Administration & Configuration 2 Planned for future release

Check file upload content with magic bytes

At current situation a malicious user can bypass the file type restrictions for logos in pem-pp application. It is possible to bypass the upload restrictions and upload a disallowed file by changing the file Content-Type to an allowed one. The ser...
about 2 years ago in Sterling Partner Engagement Manager / Security 0 Under review

Disable Terminal SSH to Secure Proxy from External (Adapter)

We are currently running the latest version of Secure Proxy and are able to ssh (terminal) through the adapter to the SSP host. Although we are not able to login, it is an audit finding to prompt for credentials. Should simply close the session. I...
about 2 years ago in Sterling Secure Proxy / Security 0 Future consideration