This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
To authenticate users/applications based on the Certificates rather than using userid and passwords
Currently, Any user trying to access NDM has to logon with userid and password either manually or via batch jobs. In order to avoid clear text passwords, Users can be authenticated based on certificates.
CX/ZOS Possibility to swap the logging so it is not increasing indefinitely
In CX/ZOS, the SYSLOG and other ddnames are increasing indefinitely. If they are Sysouts, which is convenient, this can cause Spool problems. It would be great to have the possibility to swap them, as Z/OS offers it for the ddnames JESMSGLG and JE...
SSP supports IP or User_Id whitelisting only but not a combo ( IP + User_id). We need to ability to whitelist IPs for a given User_id. This way, if a rouge employee left the firm but carries the user_id credential, he can't login from other locati...
Customer data is stored in the dedicated instance of the mongodb
Telstra Security Operations - Risk Assessment Rating Medium Solution hypervisor and storage is not dedicated to Telstra. The application and VM's and a separate instance of mongo db are dedicated to Telstra but the hypervisor and IBM cloud object ...
Customer specific encryption keys for cloud object storage (Resolution Rooms)
Telstra Security Operations - Risk Assessment Rating Medium Data at rest is encrypted using a shared encryption key. Mitigation Recommendation:IBM to provide a solution where encryption keys are unique for each customer.
Logging and Monitoring - extend the storage of Application logs to 12 months
Telstra Security Operations - Risk Assessment Rating High Audit logs are not stored for 12 months or sent to Telstra's splunk solution. Infrastructure audit logs are stored for 12 months but application audit logs only stored for 90 days. Mitigati...
Ability to override the Node Transfer Schedule Data and use the external Transit days by enhancing the GetDeliveryLeadtimeUE
In ScheduleOrder API/Transaction we use GetDeliveryLeadtimeUE to pass the transit days. This Transit days are taken into availability date calculation only when Node Transfer schedule is not setup in the system. If the Node Transfer Schedule data ...
CSR must be able to process refunds against the shipped quantity
When CSR does a refund for an overage product (Meat/Deli), IBM matches Refund quantity with ORDERED qty, NOT with SHIPPED quantity. This causes discrepancy during settlement, and needs to be manually adjusted
Do not place IBM confidential, company confidential, or personal information into any field.