Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Pinned ideas

PINNED Add support to controllerWorkflow script to restart BPs that are in "completed, error" state by individual BP IDs
During system issues, we are unable to bulk restart the BP IDs at a time. This is causing huge support effort in the clean-up process. Existing controllerWorkflow.sh script doesn't have a solution to restart the BPIDs that are in "completed, error...
PINNED Present Multiple Host Keys - RSA and ECDSA
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...

All ideas

Showing 339

Certify all components of Sterling suite to be use in virtual machines of clouds platforms like Azure, AWS, bluemix, etc.

Many customers are moving there infrastructure to the cloud, as a company that use computing services of IBM, the needs of our customers are essentials, so we need that the sterling suite must be compatible like on premise, with the O.S most use l...
over 2 years ago in Sterling B2B Integrator / Installation & Upgrade 0 Planned for future release

AES-256 encryption for .bin file creation

we understand that when a .bin file is created via lcu.jar it is encrypted with AES-128. We would like to see this encryption increased to AES-256 to satisfy our Security requirements.
over 2 years ago in Sterling Connect:Direct / Security 1 Planned for future release

Ad Hoc Report Functionality

In version 6.1.3 and earlier when a report is run, the user has the option to keep/download in different versions such as pdf, xls, csv, etc and to email the report. However, in version 6.2, this ad hoc functionality has been removed. While an ad ...
over 2 years ago in Sterling Control Center Monitor / Usability 0 Planned for future release

File agent high availability run GUI cdfa -C from a single Default_Config.ser copy in shared workspace

Instead of maintaining multiple local copies of Default_Config.ser, could a parm be added to cdfa -C to direct GUI to use a single copy in the shared directory. Similar to the cdfa -w parameter.
over 2 years ago in Sterling Connect:Direct / Usability 3 Planned for future release

Add ability to monitor Connect:Direct I5 on any selected port.

Due to CIP mandate, Cigna is disabling all unencrypted ports and we need the ability to select an SSL encrypted port in SCC to monitor I5 Connect:Direct nodes. SCC currently monitors I5 nodes on default ports and current default unencrypted ports ...
over 2 years ago in Sterling Control Center Monitor / Security 1 Planned for future release

Credential enumeration

Credential enumeration occurs when an attacker can determine the validity of credentials by observing responses in the application and identifying differences between correct and incorrect responses. Attackers may be able to use this vulnerability...
over 2 years ago in Sterling Control Center Monitor / Security 1 Planned for future release

podman support for PEM

RHEL 8 native provides podman instead of docker. While it's possible to install docker ce on RHEL, that puts the user into unsupported area with RHEL 8 support. Would like to have podman as a support container engine.
over 2 years ago in Sterling Partner Engagement Manager / Administration & Configuration 3 Planned for future release

Add a column in the EDI Searching files results as ISA Control Number into InFlight

Refugio Granados Bustos (Customer)Dec 20, 2021, 18:08 I want to see the ISA control number after the search result, but all the columns are referring to another things (Status, Date/Time, Type, Sender, Receiver, Reference, etc etc)...see the scree...
over 2 years ago in Sterling B2B Integration SaaS 0 Planned for future release

Map name in InFlight Configure columns section.

In the outbound scenario sometimes we have seen for same TP ISA ID we will have different maps being used and having map name in configure column would help to list all the maps being used by the same TP. In some cases we have seen TP comes up wit...
over 2 years ago in Sterling B2B Integration SaaS / Inflight 0 Planned for future release

Need to support configuration for all protocols regarding forward proxies

A customer with whom I am working requires forward proxies for all protocols they use, in this case FTPS, SFTP and HTTPS. Their expectation is that Secure Proxy support these protocols both as reverse and forward proxies.
over 2 years ago in Sterling Secure Proxy 0 Planned for future release