This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
Enable myFileGateway multi-factor authentication. Different fields be added for token and password
Enable different fields to be added in the Login's Page for myFilegateway.
We need to receive an extra field during login authentication on myFileGateway, as a random Token for example.
Using pre-login Exit...
Understand that current supported SSH Key Exchange Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1
However, is it possible to support more diffie-hellman algorithm?
We have a vendor that is requiring that we use "hmac-sha2-512" for our SFTP connection to them. I don't see that as an option per the documentation:The MAC the client prefers to use for stream encryption. Required. Valid values are:hmac-sha1hmac-m...
One of our Customer (STATE BANK OF INDIA) raised the below security issue. They are migrating their SFTP partner to Sterling File Gateway. They have requested to have CAPTCHA option when partners uploading files via the SFG UI. Their requirement i...
Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened or executed
External users can upload files to a mailbox. However, the files are not scanned for malicious content in mailbox. More Info - Perform periodic scans of the information system and real-time scans of files from external sources as files are downloa...
Do not place IBM confidential, company confidential, or personal information into any field.