Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Pinned ideas

PINNED Present Multiple Host Keys - RSA and ECDSA
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...

Sterling Secure Proxy

Showing 112 of 2627

Password Security Controls

Password security controls for SSP administrator interfaces using local authentication are not allow enough password security controls: Passwords expiration can’t be enforced. Password complexity settings are minimal and don’t comply with the sec...
almost 6 years ago in Sterling Secure Proxy / Security 1 Planned for future release

Inactive User Accounts Controls - Administrator Accounts

Application parameter settings that do not automatically disable and/or remove user accounts after a specified period of inactivity may result in unauthorized access, modification, destruction, and/or disclosure of confidential information.
almost 6 years ago in Sterling Secure Proxy / Security 1 Not under consideration

SSP Authentication APIs

SFG REST APIs could send/receive files however for the external trading partners this is not possible with SSP in between
over 6 years ago in Sterling Secure Proxy / APIs & SDKs 0 Not under consideration

Ability to see perimeter server status on SSP (i.e. monitioring - running/stopped)

Currently we're unable to see which perimeter servers are active on the Sterling Secure Proxy engines, this in turn can cause issues if duplicates are present. This would mimic the monitoring ability currently in place for adapters.
over 6 years ago in Sterling Secure Proxy / Usability 0 Not under consideration

SSP Custom User Roles

Right now SSP currently allows for two user roles (Admin, Operator)within the application. We would like to be able to create custom roles based on specific user requirements so exact permissions can be assigned.
almost 7 years ago in Sterling Secure Proxy / Security 1 Future consideration

Make Sterling Secure Proxy perform DNS resolution at the connection time

Currently SSP Engines only perform DNS lookups when the configuration is loaded from the configuration manager. This should be changed so that DNS resolution is performed at the time of a connection, when a node's configuration is accessed.
almost 7 years ago in Sterling Secure Proxy / Technology Stack Support (OS, DB, Protocols) 0 Not under consideration

SCC needs a configuration reporting function

SCC needs a configuration reporting feature that allows users to determine the way in which objects are configured. Auditing of the application is an incredibly tedious process of checking every screen for every configuration item in the applicati...
almost 7 years ago in Sterling Secure Proxy / Reporting 0 Not under consideration

Utility option to a view only mode for SSP configuration

Currently the only way to view a configuration (Adapter, netmap,policy, etc ) is to open it for editing. This causes unnecessary riskto accidentally make changes of production configurations.
almost 7 years ago in Sterling Secure Proxy / Administration & Configuration 0 Not under consideration

Key Expiry Notification and Secure+ Enabled

Sterling Secure Proxy Administration of Certificate Expiry and Secure+ Enabled View
almost 7 years ago in Sterling Secure Proxy / Administration & Configuration 0 Not under consideration

Multiple Host Key availability for partners.

Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger than RSA (ECDSA) while other vendors d...
3 months ago in Sterling Secure Proxy / Security 0 Submitted