This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
As part of Map Change team we receive requests for JSON map development. JSON maps layout will be differ from typical maps as the expected output is human readable text to store and transmit data objects consisting of attribute–value pairs and arr...
Dear Team, Greetings of the day!! Requesting to add the user disable feature so that when an user who has not logged in since last one month will be disable by the admin for security reasons. We have user update,edit,delete features in version 6.3...
We are currently trying to automate a bit our software lifecycle management and we would like to automate the compilation and deployment of maps on our Linux system. We are using Azure pipeline for this automatization and we would like to have a w...
There are multiple passwords mentioned in the file setup.cfg - database, truststore, test mode, etc. these passwords are expected to be encrypted as per customers security requirements. Currently these are in plaintext.
When working with our IBM partners, there was a tool that the team used for monitoring system health. We have implemented Sterling Inventory Visibility for our website (9/27/22). However, there is trepidation in the team as we have no way to see h...
Modify configureCmSsl.sh and configureEngineSsl.sh to allow for command line paramter passing
the current scripts allow for some parameters to be passed, but when exporting a CM configuration, you must always supply a second passphrase for the encryption of the exported xml file. This parameter cannot be passed without feeding it from your...
Sterling Out of box agents to read messages from Kafka.
Sterling Out of box integration with Kafka
WSI is moving to Kafka for all the asyn messaging process from current JMS(Tibco EMS). We are looking at Sterling Out of box agents to read messages from Ka...
Do not place IBM confidential, company confidential, or personal information into any field.