Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Pinned ideas

PINNED Add support to controllerWorkflow script to restart BPs that are in "completed, error" state by individual BP IDs
During system issues, we are unable to bulk restart the BP IDs at a time. This is causing huge support effort in the clean-up process. Existing controllerWorkflow.sh script doesn't have a solution to restart the BPIDs that are in "completed, error...
PINNED Present Multiple Host Keys - RSA and ECDSA
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...

All ideas

Showing 3025

Specify our desired default settings for Preferred Cipher and Preferred MAC Algorithm

When creating a new SSH Remote Profile, the Preferred Cipher and Preferred MAC fields are defaulting to values that are deprecated (blowfish-cbc and hmac-sha1). I was told that those deprecated settings are hardcoded in the B2Bi application. We wi...
almost 2 years ago in Sterling B2B Integrator / Security 4 Functionality already exists

Monitor and alert on expiring SFG/B2Bi certificates and keys

Control Center already provides monitoring and alerting on certificates used in SSP and C:D. SFG transfers using protocols such as FTPS, AS/2, and EBICS also rely on certificates with SFTP transfers relying on SSH keys to secure them. Where SFG is...
11 months ago in Sterling Control Center Monitor / Usability 1 Submitted

Calculate and publish Inventory Availability Based on Item Assigned Attribute Changes

Existing inventory availability calculations do not automatically adjust to changes in custom item attributes ( ItemAssignedAttribute ) leading to potential inaccuracies in stock levels and order fulfillment. For example, if the department value i...
over 1 year ago in Intelligent Promising 0 Planned for future release

Add B2Bi REST API audit logs

B2Bi Rest API is becoming common in several solutions but there is not a proper audit log file or report to verify information like " USER - ACTION / API - TIMESTAMP" It is difficult to understand what is actually being consumed, by whom and how o...
over 6 years ago in Sterling B2B Integrator / APIs & SDKs 4 Planned for future release

Cryptographic function used for TLS certificates storage should use SHA-384 or SHA-512 or POLY-1305

CA Certificates, Key Certificates and Private Keys are stored in key database file cdkeystore.kdb + STH file. In addition software stores the key database password in .keystore file and passphrase to the private key in .password file in C:\Program...
almost 2 years ago in Sterling Connect:Direct / Security 4 Not under consideration

Support service mesh for container deplyments

Enterprise customers are specifying service mesh as a requirement for container deployment under kubernetes especially OpenShift. Requirement is to support and keep current especially for Red Hat Service Mesh based on istio
3 months ago in Sterling Transformation Extender / Installation 0 Under review

Support service mesh for container deployments

Enterprise customers looking to deploy containers under kubernetes, especially in OpenShift, specify that service mesh must be used, in this case Red Hat's Service Mesh based on istio

Support service mesh for container deployments

Enterprise customers looking to deploy containers under kubernetes, especially in OpenShift, specify that service mesh must be used, in this case Red Hat's Service Mesh based on istio
3 months ago in Sterling Connect:Direct / Technology Stack Support (OS, DB, Protocols) 2 Future consideration

Support service mesh for container deployments

Enterprise customers looking to deploy containers under kubernetes, especially in OpenShift, specify that service mesh must be used, in this case Red Hat's Service Mesh based on istio.

Support service mesh for container deployments

This is a mandated requirement for clients deployment in production environments, in this case to support a service mesh by Istio especially the Red Hat OpenShift Service Mesh implementation: https://istio.io/latest/about/service-mesh/