This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
A z/OS callable stub to aid program development and test.
Business use of programs developed internally or by third parties or IBM may require load and execution during IPL or program load. The problem is the acquired storage address may change which which present difficulties in setting needed debug SLI...
I can see that the existing BPN Reports has options for running reports to get the ExteraInfo1 and ExtraInfo2 reports but the SPE Reporting has not been given with this option.
We need this information as we are storing some of the important det...
To authenticate users/applications based on the Certificates rather than using userid and passwords
Currently, Any user trying to access NDM has to logon with userid and password either manually or via batch jobs. In order to avoid clear text passwords, Users can be authenticated based on certificates.
CX/ZOS Possibility to swap the logging so it is not increasing indefinitely
In CX/ZOS, the SYSLOG and other ddnames are increasing indefinitely. If they are Sysouts, which is convenient, this can cause Spool problems. It would be great to have the possibility to swap them, as Z/OS offers it for the ddnames JESMSGLG and JE...
SSP supports IP or User_Id whitelisting only but not a combo ( IP + User_id). We need to ability to whitelist IPs for a given User_id. This way, if a rouge employee left the firm but carries the user_id credential, he can't login from other locati...
Customer data is stored in the dedicated instance of the mongodb
Telstra Security Operations - Risk Assessment Rating Medium Solution hypervisor and storage is not dedicated to Telstra. The application and VM's and a separate instance of mongo db are dedicated to Telstra but the hypervisor and IBM cloud object ...
Customer specific encryption keys for cloud object storage (Resolution Rooms)
Telstra Security Operations - Risk Assessment Rating Medium Data at rest is encrypted using a shared encryption key. Mitigation Recommendation:IBM to provide a solution where encryption keys are unique for each customer.
Logging and Monitoring - extend the storage of Application logs to 12 months
Telstra Security Operations - Risk Assessment Rating High Audit logs are not stored for 12 months or sent to Telstra's splunk solution. Infrastructure audit logs are stored for 12 months but application audit logs only stored for 90 days. Mitigati...
Ability to override the Node Transfer Schedule Data and use the external Transit days by enhancing the GetDeliveryLeadtimeUE
In ScheduleOrder API/Transaction we use GetDeliveryLeadtimeUE to pass the transit days. This Transit days are taken into availability date calculation only when Node Transfer schedule is not setup in the system. If the Node Transfer Schedule data ...
Do not place IBM confidential, company confidential, or personal information into any field.