This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
Prevent Cognos pop-up from being closed without logging out first.
Currently the Cognos pop-up can be closed without any feedback, but then the user can't log in again. Having Cognos to force a pop-up similar to how Call Center does, the "Changes you made may not be saved" prompt which gives a warning before clos...
Any configuration information stored in the CCM database must be encrypted
Requirement stated by customer that all configured objects in the database must be encrypted. This includes audit information and any information containing IPs, host names and passwords. Whole-disk encryption, SAN storage encryption, and database...
Customer requires complete encryption of all objects stored at rest in B2Bi/SFG database including trading partner information
Requirement has been stated by customer that all columns in the B2Bi/SFG database be encrypted, beyond what is hashed (passwords) and at-rest encryption (documents). This would include more recent sensitive information such as user names, IPs and ...
Today in ICC when files queued up in "Queued process" It need to be handled manually to move to completed process. Then the process would be eligible for purging. Latest version of ICC 188.8.131.52 will allow user to handle queued process / page. If cu...
OOTB API to update to the delivery and transportation schedules for Carrier Service configuration
We had customer requirement to provide integration interface for carrier calendars. Calendars to be supported through api/integration at carrier service level are transportation and delivery calendars. We can see that user interface is provided in...
File Agent Rule Definition Panel: Capability to use the same arguments in the "process name" field as in "process arguments"
We would like to create a very dynamic approach for the definition of file agent rules using the "monitor subdirecctory feature" and a model for subdirectory structures containing the cdp process file name.
Tracing User Activity Across Multiple Sterling Applications
We are frequently receiving some requirements from the business regarding user activity for different applications(for ex: Call Center for Commerce, Sterling Business Center, IBM Store) which they are currently using.
For some users we are pr...
Currently, admins cannot easily see which users are federated and which are not. We have to actively reach out to IBM to see if the new user is federated then we can proceed with providing access. This process is long and labor intensive. Providin...
Do not place IBM confidential, company confidential, or personal information into any field.