Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Pinned ideas

PINNED Present Multiple Host Keys - RSA and ECDSA
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...

Sterling Secure Proxy

Showing 100 of 2397

Adding TLSv1.2 extensions to support ALPN (Application-Layer Protocol Negotiation) / NPN (Next Protocol Negotiation)

One of our AS2 external trading partners attempted to send sslv2 client hello but the encryption is tlsv1.2
about 6 years ago in Sterling Secure Proxy / Technology Stack Support (OS, DB, Protocols) 0 Not under consideration

Add successful security handshake information to the audit log

Add information to the SSP audit log regarding what was negotiated during a successful security handshake. For SSL/TLS this would include the protocol version(SSLv3.0, TLSv1.0, etc.), the cipher agreed upon and the client source IP. For SFTP/SSH t...
about 6 years ago in Sterling Secure Proxy / Other 0 Future consideration

Allow Sterling Secure Proxy to perform URL Redirection for Reverse Proxy

Sterling Secure Proxy on Red Hat Linux version 2.6.32-696.1.1.el6.x86_64 is unable to route to different Outbound Nodes based on the URL that is sent to the proxy. Example (test vs prod at end of url):Incoming URL https:proxy.com:443/rosettanet/te...
about 6 years ago in Sterling Secure Proxy / Administration & Configuration 0 Not under consideration

Concept of Certificate Grouping and Referring Group Directly Under Netmaps

In Today's world, when Client Authentication is Enabled in SSP, firstly we need to get the root and intermediate certs and check-in to the SSP and then choose the new certificates in the respective netmaps. The number of netmaps we need to make th...
about 6 years ago in Sterling Secure Proxy / Usability 2 Not under consideration

Functionality to Retain Adapter Status in SSP Application in case of a reboot

In the current version of Sterling Secure Proxy available in the market there is no functionality to retain the Adapter state in case of a reboot. Ideally whenever we restart our SSP Engine Application all the adapters are getting started irrespec...
about 6 years ago in Sterling Secure Proxy / Usability 0 Not under consideration

Limit Secure Proxy sessions by inbound IP address

We want the ability to limit inbound sessions per IP address at the adapter level. We don't want to maintain inbound IP addresses in SSP but we would like SSP to be intelligent enough to realize when an external inbound IP is consuming X number of...
about 6 years ago in Sterling Secure Proxy / Performance 0 Not under consideration

SSP - Disable TLS1.0

SSLv3 is disabled by default in SSP in the java.security file with the following line of code. We have attempted to add TLS1 to disable TLS1.0 only and we were not successful. Adding TSL1 to the list of algorithms disabled all versions of TLS not ...
about 6 years ago in Sterling Secure Proxy / Security / Usability 0 Not under consideration

Allow CD netmap in SSP multiple hosts/IP addresses under the same s-node name

Allow multiple hosts/IP addresses per CD node on SSP netmap. Currently in SSP v343 product, CD node and its address are 1:1 mapping. We currently have 4 CD server adapters on backend SBI 2 node cluster. These SBI CDSA all share the same CD node na...
about 6 years ago in Sterling Secure Proxy / Administration & Configuration 1 Not under consideration

Secure Proxy support for Perfect Forward Secrecy (PFS)

We run Pentest's against any external interface which includes Secure Proxy to identify any potential security issues. It was found that Perfect Forward Secrecy (PFS) is not supported. The server's SSL/TLS configuration does not support Perfect Fo...
about 6 years ago in Sterling Secure Proxy / Security 0 Not under consideration

Monitoring SSP authorization through SCC

Hi Team, One of my client has a requirement to monitor and generate a report which gives the details of users who initiated a connection to SSP.It should capture both successful and unsuccessful attempts along with the username. Currently, the onl...
about 6 years ago in Sterling Secure Proxy / Reporting 0 Future consideration