Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

FILTER BY CATEGORY

All ideas

Showing 618

Any configuration information stored in the CCM database must be encrypted

Requirement stated by customer that all configured objects in the database must be encrypted. This includes audit information and any information containing IPs, host names and passwords. Whole-disk encryption, SAN storage encryption, and database...
over 1 year ago in Sterling Control Center Monitor 2 Future consideration

Customer requires complete encryption of all objects stored at rest in B2Bi/SFG database including trading partner information

Requirement has been stated by customer that all columns in the B2Bi/SFG database be encrypted, beyond what is hashed (passwords) and at-rest encryption (documents). This would include more recent sensitive information such as user names, IPs and ...
over 1 year ago in Sterling B2B Integrator 0 Future consideration

collect ebics client messages from B2BI as a standard protocol

Today only Ebics server messages are collected by ICC. for EBICs client, nothing gets to ICC, and therefore ICC is not supervising and monitoring all standard B2Bi protocols. This has a huge impact as we can't use ICC as a central monitoring solut...
about 4 years ago in Sterling Control Center Monitor / Usability 1 Future consideration

Add equivalent of cdai_verifyUpgrade parameter

For silent install, users get a chance to set upgrade options (parameters). One of those is cdai_verifyUpgrade which enables/disables step that performs loopback transfer after upgrade to verify if upgrade was successful. If loopback transfer is n...
almost 3 years ago in Sterling Control Center Director 1 Future consideration

COC Data Extract should send deleted records to the FTP to avoid orphaned records in target data warehouse.

When we remove and add new data thru API or internal code, the deleted records get removed and not propagated to the target system consuming the COC Data extract data published from OMS. This causes additional records to be retained in the target ...
almost 3 years ago in Self Service Tool 1 Future consideration

Add "Session ID" for SEAS authentication attempts

In a high-traffic system it can be difficult to determine which log entries in the seas logs are related to a given authentication attempt. Currently we're forced to grep / search for the specific username /timeframe and then manually parse throug...
about 4 years ago in Sterling External Authentication Server / Administration & Configuration 0 Future consideration

Encryption for Socket Adapter

We would like to exchange data over Socket securely and would like if ITX/WTX can add encryption to Socket Adapter
over 1 year ago in Sterling Transformation Extender / Adapters 0 Future consideration

Rest API: Allow Redeliver by route_key (deliveryKey)

I want to use the Sterling B2B Rest API to Redeliver a single delivery from a Broadcast route as can be done from Filegateway as seen in support article: https://www.ibm.com/support/pages/node/298739 In the B2B Rest API explore there is the uri /B...
over 1 year ago in Sterling File Gateway / APIs & SDKs 1 Future consideration

Enable users to see federated accounts

Currently, admins cannot easily see which users are federated and which are not. We have to actively reach out to IBM to see if the new user is federated then we can proceed with providing access. This process is long and labor intensive. Providin...
over 1 year ago in OMS - Order Management (OnPrem & OMoC) 0 Future consideration

SEARCHUP() & SEARCHDOWN() functions should return all matched records, Instead of first match

Currently SEARCHUP() and SEARCHDOWN() functions return only single object. We need the functionality for these functions to return all matched records instead of one similar to how EXTRACT() function returns data. Using EXTRACT() on large data set...
almost 3 years ago in Sterling Transformation Extender / Maps & Type Trees 1 Future consideration