This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
Update ExtraInfo1 Information using Rule Assignment to display in the Inflight document tracking
Currently, We can update sender/receiver/document type/reference number information using rule assignments to display in the Inflight document tracking. But we don't have any direct assignment in the rule to update ExtraInfo1 information. Currentl...
Connect:Direct Client Identification by the Connect:Direct Server
Connect:Direct, although a peer to peer MFT tool, uses a client - server model as it's underlying architecture. With a client submitting a job to the C:D server, we cannot identify the client server with the current state of affairs if the C:D ser...
Any configuration information stored in the CCM database must be encrypted
Requirement stated by customer that all configured objects in the database must be encrypted. This includes audit information and any information containing IPs, host names and passwords. Whole-disk encryption, SAN storage encryption, and database...
Customer requires complete encryption of all objects stored at rest in B2Bi/SFG database including trading partner information
Requirement has been stated by customer that all columns in the B2Bi/SFG database be encrypted, beyond what is hashed (passwords) and at-rest encryption (documents). This would include more recent sensitive information such as user names, IPs and ...
Currently, admins cannot easily see which users are federated and which are not. We have to actively reach out to IBM to see if the new user is federated then we can proceed with providing access. This process is long and labor intensive. Providin...
Implementing a new adapter to convert encoded XML string to process data.
I have a BP which converts a JSON to XML using xmljsontransformer. The XML is then saved in textual format in the process data ("Output" tag) and subsequently I have to convert it to XML always in the process data. If get the output from the file ...
Do not place IBM confidential, company confidential, or personal information into any field.