This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
As an OMS user we would like to be able to delete/remove an item from a return receipt so that we do not accidentally credit the incorrect item. As per IBM team, it seems the default order modification rules in OMS do not allow to delete lines fro...
Add ability to monitor Connect:Direct I5 on any selected port.
Due to CIP mandate, Cigna is disabling all unencrypted ports and we need the ability to select an SSL encrypted port in SCC to monitor I5 Connect:Direct nodes. SCC currently monitors I5 nodes on default ports and current default unencrypted ports ...
Currently while configuring the AS2 profile for partners, the only encryption algorithms allowed are DES, RC2 and AES. We need the GCM ciphers also to be made available on the dropdown for "Encryption Algorithm"
The current 1.0 store supports multiple tabs open on a screen, The store associates use this multi-tab format in the 1.0 to work on multiple shipments at a time. This helps in increasing productivity since they move on to shipments if they are blo...
Credential enumeration occurs when an attacker can determine the validity of credentials by observing responses in the application and identifying differences between correct and incorrect responses. Attackers may be able to use this vulnerability...
Ability to manually reprice open order in Order Hub
We are looking for a feature in Order Hub to manually reprice one open order at a time as well as a group of open orders together. The reprice functionality should pull in the current list price from price list and discounts/modifiers from pricing...
Do not place IBM confidential, company confidential, or personal information into any field.