Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Clear

Pinned ideas

PINNED Present Multiple Host Keys - RSA and ECDSA
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...

Ideas

Showing 122 of 2967

Multiple User Credentials

Our product team has grown exponentially; we now have around 9 teams with 2-4 developers in each team, and potentially all will have PROD access to IV at some point. Currently, we only have one generic user credentials to make changes in PROD. Thi...
about 4 years ago in Inventory Visibility 1 Not under consideration

diffie-hellman-group-exchange-sha256 Moduli min bits

As diffie-hellman-group-exchange-sha256 typically used a minimum of 2048 bits for the key size. However for the stronger security, it's recommended to use 3072 bits or even 4096 in SSP. However, we can't change the min bits of moduli in SSP to ful...
about 1 year ago in Sterling Secure Proxy / Security 1 Planned for future release

Observability Dashboard for Synchronization Jobs Performance

Monitoring Dashboard of IV processes. Supply, Demand, Reservation Async Jobs Performance Dashboard with KPIs like Average Processing Time, Max on Daily/Weekly/Monthly Periods, and Adherence to SLAs.For example, avg time to complete Supply Sync cal...
about 2 years ago in Inventory Visibility 1 Future consideration

Solution to Prevent Inventory Availability going negative

Currently when an inventory is added through cycle count or removed through Transfer Order we have a default segment as WALK_IN for IV system. But in some cases it is leading to negative inventory in WALK_IN segment when there is inventory only in...
about 1 year ago in Inventory Visibility 0 Future consideration

Get Availability by tag (inventory identifier)

IV does not currently provide availability by tag. It does support taking supplies/demands by tag. OMoC will generate the TagNumber and pass it to IV for supply/demand updates. IV will store them as OMoC had provided. However, you will not be able...
over 5 years ago in Inventory Visibility 2 Future consideration

expand password length to 100 Characters

Consistency of all IBM products to allign with the RACF maximum Password/Passphrase Lengths,
about 1 year ago in Sterling Secure Proxy / Security 1 Planned for future release

SSP - Disable TLS1.0

SSLv3 is disabled by default in SSP in the java.security file with the following line of code. We have attempted to add TLS1 to disable TLS1.0 only and we were not successful. Adding TSL1 to the list of algorithms disabled all versions of TLS not ...
almost 8 years ago in Sterling Secure Proxy / Security / Usability 0 Not under consideration

Short pick/reject from a store results in a inventory oversell

When a shortage is reported from a store (through out of the box IBM Store module) that results in the order being backordered, the backorder demand is not being considered in the overall shipping aggregate ATP in OMS. As a result, this will resul...
over 5 years ago in Inventory Visibility 6 Future consideration

Fulfillment Overrides at Segment Level

Currently fulfillment overrides only allows you to enable / disable at delivery method level. Ability to enable / disable at delivery method + segment / segment type level would allow ability to enable / disable for different channels (e.g. own si...
almost 3 years ago in Inventory Visibility 0 Future consideration

Node level safety stock values considered when calculating Network level SS

This feature would allow retailers who already define safety stock at node level to more easily leverage the new IBM safety stock rules because the values they set at node level can automatically be considered to create a network level value
about 3 years ago in Inventory Visibility 0 Future consideration