This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
Currently while configuring the AS2 profile for partners, the only encryption algorithms allowed are DES, RC2 and AES. We need the GCM ciphers also to be made available on the dropdown for "Encryption Algorithm"
Turning off Audit, traces & backup (logs) dynamically in runtime
We process very large volume of HIPAA/ non-HIPAA transactions on daily basis with file size from 1KB - 2GB of data. In our architecture/ solution we always uses ITX along with the IIB/ACE product. At times our developers forget to turn off either ...
Update ExtraInfo1 Information using Rule Assignment to display in the Inflight document tracking
Currently, We can update sender/receiver/document type/reference number information using rule assignments to display in the Inflight document tracking. But we don't have any direct assignment in the rule to update ExtraInfo1 information. Currentl...
Connect:Direct Client Identification by the Connect:Direct Server
Connect:Direct, although a peer to peer MFT tool, uses a client - server model as it's underlying architecture. With a client submitting a job to the C:D server, we cannot identify the client server with the current state of affairs if the C:D ser...
Ensure failover detection ping from SSP PS can be recognized as such in B2B
These pings are causing literally thousands of errors in our C:D logs on B2B every hour - as the C:D server adapter can see the pings hitting the port but recognizes that they are not valid C:D sessions. A recent health check performed by IBM/Sabr...
Any configuration information stored in the CCM database must be encrypted
Requirement stated by customer that all configured objects in the database must be encrypted. This includes audit information and any information containing IPs, host names and passwords. Whole-disk encryption, SAN storage encryption, and database...
Customer requires complete encryption of all objects stored at rest in B2Bi/SFG database including trading partner information
Requirement has been stated by customer that all columns in the B2Bi/SFG database be encrypted, beyond what is hashed (passwords) and at-rest encryption (documents). This would include more recent sensitive information such as user names, IPs and ...
Do not place IBM confidential, company confidential, or personal information into any field.