This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
Need a list of schedule timing for all active scheduled Business Process
We need a list of reporting consist of exact schedule for all active Business Process Schedule, currently need to look one by one, we have about 3000 Business Process therefore its hard to kept at looking one by one BP schedule for manageability
Excel Adapter - When importing an Excel spreadsheet. Use the first Row as the Column Names.
When importing an Excel Spreadsheet as a type tree, the importer creates a type tree with Generic Names : ie . COLA COLB..... If the importer can have an option to use the first ROW as the Column Names, then when the type tree is created, the Colu...
Enhance the product to charge/settlement based on the authorized amount and authorization id mapping
The following is the issue scenario Line 1 – Authorized (individual auth id) along with shipping charge (Authorized -individual auth id). Shipped and invoiced Line 2 – Authorized with auth id. As part of the settlement, a single charge record is o...
As part of Change Request Project - Report data capture was not included - Client has been on the Solution for 6 months - client requestors and management request reporting capability that has been partially addressed within the product as a mass ...
During project client had "protected" one field for hundreds of items - which when they came over to MRO - they are still "Protected", but now they want to remove the protection and asking if this can be done via the bulk features. It was noted th...
With the advent of later iFixes in 126.96.36.199 and in 6.3.0 moving forward need the ability to control ciphers for web and interop
The ability to manage ciphers for the secured web server/console (default port 58083) and interop connections (same port) was deprecated. Customers often have specific ciphers that must not or must be supported. Leaving a default set of ciphers is...
Need to know length of salt for passwords and preferably configure it
As customers tighten their security policies, some are developing or already have requirements that the length of salt applied to a password must be a minimum number of characters. There is no current way to determine this or change it within B2B ...
Implement config or variable to enforce DGADBATC to use specific tcp stack in batch
We're using batch utility DGADBATC in a multiple tcpip stack(cinet) environment and would like to have a parm variable or other config option to specify the utility to utilize specific tcpip stack. The standard options like : //CEEOPTS DD * ENVAR(...
Do not place IBM confidential, company confidential, or personal information into any field.