This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...
Require additional attributes in Customer Definition pop up while assigning pricing rule to customers in SBC
Requirement is to assign pricing rule to customers based on CustomerClassificationCode (OOB), ExtnReturnable and ExtnDCDiscount (Extn attributes) attributes in customer master. These attributes are currently not present in SBC. On a creating a Pri...
Currently while configuring the AS2 profile for partners, the only encryption algorithms allowed are DES, RC2 and AES. We need the GCM ciphers also to be made available on the dropdown for "Encryption Algorithm"
Turning off Audit, traces & backup (logs) dynamically in runtime
We process very large volume of HIPAA/ non-HIPAA transactions on daily basis with file size from 1KB - 2GB of data. In our architecture/ solution we always uses ITX along with the IIB/ACE product. At times our developers forget to turn off either ...
Update ExtraInfo1 Information using Rule Assignment to display in the Inflight document tracking
Currently, We can update sender/receiver/document type/reference number information using rule assignments to display in the Inflight document tracking. But we don't have any direct assignment in the rule to update ExtraInfo1 information. Currentl...
Connect:Direct Client Identification by the Connect:Direct Server
Connect:Direct, although a peer to peer MFT tool, uses a client - server model as it's underlying architecture. With a client submitting a job to the C:D server, we cannot identify the client server with the current state of affairs if the C:D ser...
Ensure failover detection ping from SSP PS can be recognized as such in B2B
These pings are causing literally thousands of errors in our C:D logs on B2B every hour - as the C:D server adapter can see the pings hitting the port but recognizes that they are not valid C:D sessions. A recent health check performed by IBM/Sabr...
Any configuration information stored in the CCM database must be encrypted
Requirement stated by customer that all configured objects in the database must be encrypted. This includes audit information and any information containing IPs, host names and passwords. Whole-disk encryption, SAN storage encryption, and database...
Do not place IBM confidential, company confidential, or personal information into any field.