Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Pinned ideas

PINNED Add support to controllerWorkflow script to restart BPs that are in "completed, error" state by individual BP IDs
During system issues, we are unable to bulk restart the BP IDs at a time. This is causing huge support effort in the clean-up process. Existing controllerWorkflow.sh script doesn't have a solution to restart the BPIDs that are in "completed, error...
PINNED Present Multiple Host Keys - RSA and ECDSA
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...

All ideas

Showing 2965

Secure Connection between Secure Proxy Engine (in DMZ) and SSP Perimeter Server (in Secure Network)

There is a requirement from customer to have Secure Connection between Secure Proxy Engine (in DMZ) and SSP Perimeter Server (in Secure Network).
over 6 years ago in Sterling Secure Proxy / Security 0 Future consideration

SI's bpml should support XPath 3.1

When writing Xpath in bp's, the xpath supported is XPath 1.0, which was published in 1999. XPath is currently up to version 3.1.
almost 2 years ago in Sterling B2B Integrator / Standards 3 Future consideration

Option to default the optimization method to better service level of "Optimal" and "Fixed Service Level"

For our critical materials, it is imperative that we have stock availability. To ensure this, we use fixed service levels of 98% (for top tier equipment) and 95% for the remainder of material marked critical in SAP. HOWEVER, often times, the Optim...
almost 2 years ago in Maximo Inventory Optimization 1 Future consideration

Add Password Expiration to the Password Policy for Control Center

We need to be able to set a password expiration for Control Center users. It needs to be flexible so that certain users/roles can be set to never expire.

Request for improvement of the CONNECT DIRECT manual contents so that incompatibility information items are clearly indicated

Our client plans to upgrade Connect:Direcr for z/OS from V6.1 to V6.4 in 2025 and we need to provide them with information about incompatibilities from V6.4 to V6.1. We checked the manual of IBM Connect:Direct for z/OS 6.4 Documentaion, but there ...
11 months ago in Sterling Connect:Direct for Z/OS 4 Functionality already exists

Support for SHA-3 cryptographic algorithms

to support the below emerging cryptographic algorithmsSHA-3, including ALL variants listed here: https://en.wikipedia.org/wik: i/SHA-3#Instances
about 2 years ago in Sterling Connect:Direct / Security 0 Future consideration

Enhance the supplyChange.v2 event schema to allow propagation of custom attributes included in the original IV request.

Problem Statement:We are using the supplyChange.v2 event to publish IV resonance data to a configured webhook endpoint. As part of our implementation, we are including several custom attributes (e.g., SourceSystemID, AdjustmentReasonCodeID, etc.) ...
4 months ago in Inventory Visibility 1 Future consideration

RE: 64 Character Limitation In Email section on SI User Accounts

Hi Team, We noticed that there is a 64 character length limitation in email section on SI user accounts, please check the attached screenshot for better understanding to what I'm referring to. 64 character length limitation is not sufficient for o...
about 4 years ago in Sterling B2B Integrator / Reporting 0 Future consideration

Compliance for SWIFT members with MFA for internal users

In relation to the SWIFT Customer Security Programme, the Customer Security Controls Framework V2023, there is a mandatory requirement for relevant in scope components to implement and maintain Multi-Factor Authentication when internal operators’ ...
over 2 years ago in Sterling B2B Integrator 1 Future consideration

Security Exit must be usable by different SFTs and the STCname should be part of the RACF profile namess

In our environment we run several Connect:Direct stc's in one environment. The provided Security Exits do not offer a possibility to setup separate profiles for these stc's.We would like this to be changed. Second what we ask for is to add the STC...
over 4 years ago in Sterling Connect:Direct for Z/OS 2 Not under consideration