This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
Configuration managment needs to have a schedule and approval process
Changes made in the configuration management interface should require an approval process that could make an external call for validation if needed. This would require a scheduling function as well as an approval process.
SCC needs a configuration reporting feature that allows users to determine the way in which objects are configured. Auditing of the application is an incredibly tedious process of checking every screen for every configuration item in the applicati...
Add a timeout parameter which trigger alternate destination on SFTP outbound node
On Netmap Outbound Node, it's possible to set an alternate destination node to insure a failover service of the primary node. The alternate destination is used when primary destination address is not reachable on network (network timeout) or if th...
Monitoring, Alerting and Reporting capabilities not available
Monitoring: The only way to investigate the status/traffic of a specific connection is accessing the Event and Audit log files located in the SSP server. This has a deep impact on the usability of the product making the operation activities of Sup...
During recent joint discussions a gap in the SSP protocol stack has been identified whereby outbound SSH connections (i.e. supporting SFTP and SCP) are not supported. In order to enforce a More Secure to Less Secure network, whereby the network ho...
Dictate cipher order for incoming HTTP transactions
We would like the ability within SSP to be able to dictate cipher order. Right now we have our security team testing our SSP nodes and when they test with the script here: https://testssl.sh/ Using version 2.9.5 we get back that the client can neg...
Add successful security handshake information to the audit log
Add information to the SSP audit log regarding what was negotiated during a successful security handshake. For SSL/TLS this would include the protocol version(SSLv3.0, TLSv1.0, etc.), the cipher agreed upon and the client source IP. For SFTP/SSH t...
Do not place IBM confidential, company confidential, or personal information into any field.