Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Pinned ideas

PINNED Add support to controllerWorkflow script to restart BPs that are in "completed, error" state by individual BP IDs
During system issues, we are unable to bulk restart the BP IDs at a time. This is causing huge support effort in the clean-up process. Existing controllerWorkflow.sh script doesn't have a solution to restart the BPIDs that are in "completed, error...
PINNED Present Multiple Host Keys - RSA and ECDSA
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...

All ideas

Showing 2640

Enhance "Stock history relocation" feature to transfer usage history between storage locations on multiple stock codes at same time.

Stock history relocation feature is very useful in transferring usage history from old storage location to another new storage location. However, it has be done one material code at a time. Operations/maintenance initiated few projects in the past...
12 months ago in MRO Inventory Optimization 0 Planned for future release

SIP: Implement Priority Based Sourcing Rules in Sterling Intelligence Promising

Priority of shipnode in Distribution group is not working while calculating estimated delivery date using Calculate item delivery or pickup date using finite capacity windows API. Customers need Ship Node Priority Based Sourcing” in SIP
9 months ago in OMS - Intelligent Promising 1

TP Names Import/Export inbuilt option in Inflight

During testing phase in inflight CTE, we keep on adding TP names and when we go live we need to update the same to production (may be with different names sometimes). We have RPA Bot to add TP names to inflight, but if we have an inbuilt function ...
over 2 years ago in Sterling B2B Integration SaaS / Inflight 0

Make the zip file layer more efficient when unzipping large numbers of files

Any customer using zip files which contains a large number of files (1000s) to be delivered to a single or even multiple consumers will notice that it can take hours to deliver even a small number 4800 small sub 1KB files to a single mailbox. If a...
over 1 year ago in Sterling B2B Integrator / Performance 0 Under review

Mask or Don't Include Passwords In Connect Direct Process Scripts that have been built in Connect Direct Web Services or Connect Direct Browser UI

Currently when a user builds a process in CDWS or CD Browser UI, the password is in plain text if a pnode/snode ID is used with password. This is a security vulnerability and should be addressed. We realize that there is no way to stop a user from...
over 3 years ago in Sterling Connect:Direct / Security 1 Planned for future release

Replication Statistics For Global Mailbox

Global Mailbox should be able to out-of-the-box provide specific details on replication between DCs. I should be able to easily find out baseline statistics for replication time between servers. I should be able to see counts for how many files ar...
9 months ago in Sterling Control Center Monitor 6 Functionality already exists

Regular expression flexibility for Search and Replace Xprocessor in BPNST Tool

Currently we have search and replace xprocessor for search a specific character/sequence of characters and replace with another character/sequence of another characters and if we need more characters to be search and replace then it's time taking ...
3 months ago in Sterling B2B Integration SaaS / Mapping & Translation 0 Not under consideration

Send connection down status file to Inflight at configured interval (Customer specific - dynamic) when SAP connection to specific host is down for longer time

Currently we are receiving connection down/up status files to Inflight at initial times and we need one more file for connection down in order to notify the Customer if the connection to specific host down for longer time. It's sort of SEV1 issue ...
3 months ago in Sterling B2B Integration SaaS / Communication Protocols 0 Under review

Dynamic removal of redundant checkpoint entries

Can the logic behind CKPT.DAYS be extended so that this function in invoked on a regular basis (e.g. daily) instead of only when z/OS Connect:Direct is started? When the checkpoint dataset becomes full, the only way to defragment it or clear out r...
9 months ago in Sterling Connect:Direct for Z/OS 2 Future consideration

PGP Encryption/Decryption of a file with multiple recipients

Trading Partners may encrypt a file using multi-recipient encryption. For instance, they may encrypt a file with our Public PGP key as well as their own key. When we receive that file, we should be able to decrypt using our private key. Symantec a...
about 2 years ago in Sterling B2B Integrator / Security 1 Future consideration