This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
Can we have a report generated every month, which should show how many times the system was down and report the timings?
Can we have a report generated every month, which should show how many times the system was down and report the timings? Say, there was an unwanted outage due to some issue, the report should show the timings and duration of the outage.
Radiant Logic LDAP to be added in the list of LDAPs supported by SEAS.
Business requires Trading Partner's accessing myfilegateway via ssp, should be able to change the password whenever they want. Trading Partner's login credentials are stored under Radiant Logic LDAP. Currently Radiant Logic LDAP is not supported i...
ATP calculations due to back order demands resulting in undersell issue
When there are orders in back order status (say ship to home orders that result in back order either a shortage reported from a fulfillment center or back order during the sourcing attempt), the system considers these backorders in both shipping a...
More authentication mechanisms can be used for Sterling Secure Proxy to be monitored by SCC
In the Sterling Secure Proxy Configuration related documents, only the user/Password authentication mechanism to be used for the SSP to be monitored by the SCC. However this method might not be a good option, since the password can't be hold for a...
We recently learnt via a support ticket (as this is currently undocumented at the time of writing) that SSP is unable to route the UDP traffic used by C:D's High-Speed Add-On FASP through SSP Perimeter Servers. This severely limits the scenarios w...
In CD Unix, there is a very useful function - pipe, which we can use to handle some complex customer requirement by integrating with our customized program. But this function doesn't exist in CD Win. Request to enhance CD Win to provide this funct...
Messages are written to the auditlog.xml file (ACPT037I, ACPT040I and ACPT038I), as well as the sspengine.log file for the same activity. It is possible to reduce the frequency of these messages, but only to once every 10 minutes. It would be grea...
Do not place IBM confidential, company confidential, or personal information into any field.