This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
Refer this PMR - https://www.ibm.com/mysupport/s/case/5000z00001FdfZAAAZ/service-to-execute-on-completion-of-work-in-agent-runtime-properties-does-not-work-in-multi-threaded-mode
Let me consider a scenario here
Total Records - 13000
Scheduling agent triggers in different time zones (Other than UTC)
Currently the advances scheduling option for agents only takes time in UTC and triggers the same in UTC time zone. For different countries like US people want agents to be trig-erred in their time zone for example EST. EST has to be converted to U...
Modify Api security on an user group multiple times
Based on the PMR I raised regarding api permission I got to know that the below are the steps to enable api security on an user group.
Got this from PMR*********
In order to modify the API permissions of a user group, you can follow these steps...
certificate-based authentication support for CDAIJ and CDW
Many customers from banks need to change their OS users' password every 1 or 3 months for all OS according to their security regulation which means all applications or middleware using the old password must change at the same time. For customers, ...
Transformation Extender to provide Map Coverage in a similar way Sonar provides code coverage.
We would like to have a tool, similar to the code coverage tools that they have for traditional code, available for ITX maps.
This functionality must be invokable both through the graphical map design tooling and available ...
Sales order process for spare parts requires determination of parts with associated serial number. Currently, OMS requires shipnode to be known, but to make use of sourcing capabilities in OMS shipnode are to be determined during scheduling and so...
Connect:Direct Application Interface for Java (CDAIJ) method for identifying a certificate that already exists in Secure+
Venafi Trust Protection Platform has built-in support for automating the lifecycle of certificates and keys for Connect:Direct Secure+ which it does using CDAIJ. Currently it is possible to determine that a certificate already exists in Secure+ be...
Do not place IBM confidential, company confidential, or personal information into any field.