Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

FILTER BY CATEGORY

Pinned ideas

PINNED Present Multiple Host Keys - RSA and ECDSA
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...

All ideas

Showing 2293 of 2293

Add VDA Version 4938 Global Invoice to Map definitions

This version is required by our trading partners.
3 months ago in Sterling Gentran & Gentran:Director / Standards 0 Submitted

Modify configureCmSsl.sh and configureEngineSsl.sh to allow for command line paramter passing

the current scripts allow for some parameters to be passed, but when exporting a CM configuration, you must always supply a second passphrase for the encryption of the exported xml file. This parameter cannot be passed without feeding it from your...
3 months ago in Sterling Secure Proxy / Administration & Configuration 1 Under review

AWSS3ClientForB2Bi Adapter can't work to receive parameters from BPML

When using the AWSS3ClientForB2Bi Adapter and configuring the connection with S3 it works well. When working with BPML and trying to pass the connections to S3 by BPML it doesn't work. The idea is to allow BPML parameters to connect with S3.
8 months ago in Sterling B2B Integrator / Usability 1 Future consideration

Secure Connection between Secure Proxy Engine (in DMZ) and SSP Perimeter Server (in Secure Network)

There is a requirement from customer to have Secure Connection between Secure Proxy Engine (in DMZ) and SSP Perimeter Server (in Secure Network).
over 4 years ago in Sterling Secure Proxy / Security 0 Future consideration

Add dedicated Safe Name and Object Name fields to Password Exit tab in Functional Authorities in Connect Direct for Windows

Currently Password Exit tab in Functional Authorities in Connect Direct for Windows allows to configure Application ID and Policy ID only. This idea is to add other fields - Safe Name, Object Name and Secure+ Label name into these settings in orde...
about 1 year ago in Sterling Connect:Direct / Administration & Configuration 1 Planned for future release

Enhance a import feature to import JSON SCHEMA and Swagger(YAML) as type tree

Currently we have capability in ITX to import the JSON file as type tree. But we have a challenge that customers might give all the possible fields and group which are mandatory/conditional in the JSON test file during development. So we end up wi...
3 months ago in Sterling Transformation Extender / Design Studio 0 Not under consideration

Check file upload content with magic bytes

At current situation a malicious user can bypass the file type restrictions for logos in pem-pp application. It is possible to bypass the upload restrictions and upload a disallowed file by changing the file Content-Type to an allowed one. The ser...
3 months ago in Sterling Partner Engagement Manager / Security 0 Under review

Myfilegateway 2.0 - merge Upload and Download views

Hello IBM team, currently, the "Upload" and "Download" views are splited in two distinct parts. This type of views create confusion from an end user point of view. Our proposal is to merge the "Upload" and "Download" views in order to hav...
about 1 year ago in Sterling B2B Integrator / Administration & Configuration 0 Future consideration

Exclude set periods from the Movement and Forecast Usage calculation due to strike or curtailment

Asset Intensive companies tend to have unionized labor forces that can go "on strike" for a number of months at a time. The usage during these strike periods tends to be considerably curtailed or non-existent. The impact of a 4-6 months-long strik...
3 months ago in MRO Inventory Optimization 1 Future consideration

ICC Ability To Monitor Cassandra, Zookeeper, Reaper, MQ for Global Mailbox

If we could see application statuses within ICC like we do for Secure Proxy & Global Mailbox (SFG/GM) applications, it would be much easier to troubleshoot issues. ICC should be a true monitoring tool for Global Mailbox, which would include di...
5 months ago in Sterling Control Center Monitor / Other 1 Future consideration