Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Clear

Pinned ideas

PINNED Present Multiple Host Keys - RSA and ECDSA
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...

Ideas

Showing 282 of 2950

The credit card industry has always has PCI as an auditing group or tool to ensure the safety and accountability when files containing card holder data is ported from end to end sites.The idea is to introduce comprehensive PCI reporting of actions taken within the connect direct application to update, modify, delete and add new items by an administrator.

The credit card industry PCI audits are becoming more intrusive. These audit groups employed by credit card processing companies are doing deep dives into products that handle credit card data and or sensitive information. In the past, the file tr...
2 months ago in Sterling Connect:Direct / Reporting 3

Allow SSP application to accept spaces and special characters in the username for LDAP integration

SSP application is not allowing AD username with spaces and special characters like '-'. Since our AD account has spaces and – in the username, this is not allowing us to integrate SSP with LDAP.
4 months ago in Sterling Secure Proxy / Security 3 Future consideration

Target node alternate communication paths not retried when connected via Sterling Secure Proxy.

There appears to be a design flaw within CD/U when communicating via SSP and target CD node not being reachable via primary path, CD/U initial SSL handshake times out and connection to target CD node not retried by CD/U via ALT.COMM path(s).
9 months ago in Sterling Connect:Direct / Other 8

Audit logging to support PCI requirements of ADMIN users and their ACTIONS

From a PCI perspective our people want Audit logging of whenever a user with ADMIN rights updates something in Connect:Direct whether via Secure+ or in the NETMAP or the Functional Authorities or Initparams. Whatever an ADMIN has rights to update,...
2 months ago in Sterling Connect:Direct / Security 3

ICAP scanning required for files pulled and pushed by Sterling Integrator

Files that are pushed by external vendors are scanned via ICAP protocol in Sterling Secure Proxy. But the files that are pulled by Sterling Integrator are not scanned as they do not pass through SSP. This leaves a big gap in the scanning feature o...
over 1 year ago in Sterling Secure Proxy / Security 2 Planned for future release

Show IPs from external connection

When the product ConnectDirect recive conection from other servers like GSLB or conections from other servers and it gets for example FMH68 or other, Its interesting konws from which servers its comming this connection, because its imposible deter...
5 months ago in Sterling Connect:Direct / Reporting 2 Future consideration

Cryptographic function used for TLS certificates storage should use SHA-384 or SHA-512 or POLY-1305

CA Certificates, Key Certificates and Private Keys are stored in key database file cdkeystore.kdb + STH file. In addition software stores the key database password in .keystore file and passphrase to the private key in .password file in C:\Program...
over 1 year ago in Sterling Connect:Direct / Security 4 Not under consideration

Allowing command line editing of the CD File Agent configuration

There is a need within the Treasury to be able to script password changes to Connect Direct File Agents. Currently there is no documented way to accomplish this outside of using the GUI.
almost 8 years ago in Sterling Connect:Direct / Usability 2 Not under consideration

Conditional Runtask/Runjob

We need to execute processes after receiving files from clients, today this process depends on the client adding the command we need to execute in its transmission process. This is done via runtask and runjob and works well, however when we need t...
over 1 year ago in Sterling Connect:Direct / Administration & Configuration 7 Not under consideration

Include the SA steps as part of run-as-root | C:D installation and upgrade

The customer noticed Connect Direct services are impacted post RHEL 8 upgrade (from previous RHEL versions 7.x) . The SA needs to perform a few steps (outlined in https://www.ibm.com/support/pages/ibm-sterling-connectdirect-unix-fails-start-red-ha...
3 months ago in Sterling Connect:Direct / Installation & Upgrade 2 Functionality already exists