This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
Allow utility scripts like changepassphrase.sh, SEASCipherConfigTool.sh, seasRestAPI.sh to run in non interactive mode
Currently I'm not able to run scripts like changepassphrase.sh, SEASCipherConfigTool.sh, seasRestAPI.sh in the non interactive mode. There is no option to pass the multiple input passphrases to those scripts. Those scripts will also error out if I...
Install agent is packaged with an older version of Java with numerous security vulnerabilities. Main java : $ ./jre/ibm-java-x86_64-80/jre/bin/java -version
java version "1.8.0_261"
Java(TM) SE Runtime Environment (build 126.96.36.199 - pxa6480sr6fp1...
CII ENVELOPE EXTRACTION PARAMETERS ARE NOT BEING PASSED TO CHILD BP WHEN INVOKE BP PER INTERCHANGE SET IN ENVELOPE
Parameters are not being passed from the system BPCIIEnvelope to the child bp when the Extract to aFile ststem is selected and invoke bp per interchange is setin the envelope. If an envelope is set for the option to Extract to a File and the assoc...
Password stretching use appropriate ASD approved algorithm for B2Bi
A recent audit under the Gateway Network Governance Body - Information Security Requirements has identified that B2BI is not compliance is ASD ISM control 1402 - Security Control: 1402; Revision: 5; Updated: Aug-20; Applicability: O, P, S, TS Stor...
Precision Administration is an approved Gateway Operator. Consequently we are bound by the security requirements of our governance body - the GNGB - https://www.gngb.com.au/ The GNGB published their Information Security Requirements which includes...
Returns processing on over shipped catch weight quantities
When a refund is initiated on an overage product (Meat/Deli), IBM matches Refund quantity with ORDERED qty, NOT with SHIPPED quantity. This causes discrepancy during settlement, and needs to be manually adjusted.
Provide capability for a BUC user to get from Node exception alert or a Node Details page to Node’s order list
OMNI Fulfillment managers oversee several hundred nodes and need the ability to see a Node's open order, or orders flagged as an exception, while reviewing the node's alerts or from the Node Detail page. Use Case. How to get from Node exception to...
Logging and Monitoring - extend the storage of Application logs to 12 months
Telstra Security Operations - Risk Assessment Rating High Audit logs are not stored for 12 months or sent to Telstra's splunk solution. Infrastructure audit logs are stored for 12 months but application audit logs only stored for 90 days. Mitigati...
Do not place IBM confidential, company confidential, or personal information into any field.