This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
Ensure failover detection ping from SSP PS can be recognized as such in B2B
These pings are causing literally thousands of errors in our C:D logs on B2B every hour - as the C:D server adapter can see the pings hitting the port but recognizes that they are not valid C:D sessions. A recent health check performed by IBM/Sabr...
Install design server and flow dashboard without internet connection
Due to security rules our servers are not connected to the internet.
For installing design server it is required to have an internet connection.
When you try to install the following happens:
Building tx-server Docker image...
Any configuration information stored in the CCM database must be encrypted
Requirement stated by customer that all configured objects in the database must be encrypted. This includes audit information and any information containing IPs, host names and passwords. Whole-disk encryption, SAN storage encryption, and database...
Customer requires complete encryption of all objects stored at rest in B2Bi/SFG database including trading partner information
Requirement has been stated by customer that all columns in the B2Bi/SFG database be encrypted, beyond what is hashed (passwords) and at-rest encryption (documents). This would include more recent sensitive information such as user names, IPs and ...
Connect Direct UNIX: Connect Direct Agent stopAgent.sh
Currently root or a user that has sudo access is the only way that the stopAgent.sh can be executed. This needs to be changed so that the installer can stop the Agent without having sudo or root access.
Add more functionality to integrate the export/import of individual configuration items with the command line
Currently it is difficult in version 6.1 to export/import individual configuration items in an automated way using a scripted approach, it would be better to have a more granular approach to ease release/migration tasks. For example being able to ...
A Corporate Store Planner should be able to onboard a new store or close an existing store. There should be a way for this person to go through a checklist of activities in some user interface to validate setup as relevant e.g. location setup, ded...
Store Manager should be able to create/update users with associate roles in their store e.g when a new associate is hired or leaves.
Also, a Corporate Store Manager should be able to create update users for any store with any role
Do not place IBM confidential, company confidential, or personal information into any field.