This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
Node level safety stock values considered when calculating Network level SS
This feature would allow retailers who already define safety stock at node level to more easily leverage the new IBM safety stock rules because the values they set at node level can automatically be considered to create a network level value
The install/upgrade/patch/hotfix process should cleanup the prior version .jar files. We have been running since 2016 and every .jar file from upgrades are in the <install>/packages folders as well as other folders having years worth of back...
PGP Encryption/Decryption of a file with multiple recipients
Trading Partners may encrypt a file using multi-recipient encryption. For instance, they may encrypt a file with our Public PGP key as well as their own key. When we receive that file, we should be able to decrypt using our private key. Symantec a...
Add EDI FA 997 correlation values to inbound document PIDs (similar to how FA 997 correlation is handled for outbound documents)
When an inbound EDI X12 document is received from a partner an outbound 997 is apparently automatically triggered based on the SCBN setup. This outbound 997 FA shares the same SCBN PID as the originating inbound document, but this action does not ...
Sterling Filegateway - Disable the Known host key validations for Outbound sftp connections ( StrictHostKeyChecking=no )
Hello - Checking, for the SFG outbound sftp client connections - if the known host key validations will be turned-off or make them dynamically added. this way we can get rid off the BP's that will fail in the steps for each occurrence when a partn...
Hide Recommended (Export) ROP, Recommended (Export) ROQ fields for MTC/OPS User Role
• As part of Item request feature roll out, end users (maintenance planners) will now need to submit item requests (stock level change requests) in MRO IO. More than 500 end users will now have read only access to MRO IO.
• As we all know material...
Provide scripting option to import, export, and deploy CDT xml files
The ssctl command can be used to upload and deploy customizations jar files. It would be nice to expand the functionality of this command to support the upload, download, import, export, and deployment of CDT xml files. This would enable automatio...
Designing a notification system - The Bell and notification centre window
Having a notification system could be useful in following areas:
1- Incoming request notifications, for example, notifications for workflow review requests which are assigned to a user to take an action on
2- Notification for action taken, for ex...
PEM currently only supports basic authentication for SMTP. ( user id, password ). At most, it does allow you to select between smtp and smtps. However, smtp providers have been moving away from basic authentication for some time. PEM does not allo...
Do not place IBM confidential, company confidential, or personal information into any field.