Skip to Main Content
IBM Sterling


This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

ADD A NEW IDEA

Pinned ideas

PINNED Add support to controllerWorkflow script to restart BPs that are in "completed, error" state by individual BP IDs
During system issues, we are unable to bulk restart the BP IDs at a time. This is causing huge support effort in the clean-up process. Existing controllerWorkflow.sh script doesn't have a solution to restart the BPIDs that are in "completed, error...
PINNED Present Multiple Host Keys - RSA and ECDSA
As with standard Linux servers today Secure Proxy should be able to present Host Keys (more than one) in both RSA and ECDSA formats depending on what type the vendor incoming connection supports. Vendors are demanding Host Keys that are stronger t...

All ideas

Showing 731

Ability to handle all queued process at one time.

Today in ICC when files queued up in "Queued process" It need to be handled manually to move to completed process. Then the process would be eligible for purging. Latest version of ICC 6.1.2.1 will allow user to handle queued process / page. If cu...
over 4 years ago in Sterling Control Center Monitor / Usability 0 Future consideration

Update ExtraInfo1 Information using Rule Assignment to display in the Inflight document tracking

Currently, We can update sender/receiver/document type/reference number information using rule assignments to display in the Inflight document tracking. But we don't have any direct assignment in the rule to update ExtraInfo1 information. Currentl...
about 2 years ago in Sterling B2B Integration SaaS / Document Tracking 6 Future consideration

OOTB API to update to the delivery and transportation schedules for Carrier Service configuration

We had customer requirement to provide integration interface for carrier calendars. Calendars to be supported through api/integration at carrier service level are transportation and delivery calendars. We can see that user interface is provided in...
over 4 years ago in OMS - Order Management (OnPrem & OMoC) 0 Future consideration

Connect:Direct Client Identification by the Connect:Direct Server

Connect:Direct, although a peer to peer MFT tool, uses a client - server model as it's underlying architecture. With a client submitting a job to the C:D server, we cannot identify the client server with the current state of affairs if the C:D ser...
about 2 years ago in Sterling Connect:Direct / Administration & Configuration 1 Future consideration

File Agent Rule Definition Panel: Capability to use the same arguments in the "process name" field as in "process arguments"

We would like to create a very dynamic approach for the definition of file agent rules using the "monitor subdirecctory feature" and a model for subdirectory structures containing the cdp process file name.
over 4 years ago in Sterling Connect:Direct / Administration & Configuration 3 Future consideration

Add Fields to Order Hub (reference, referenceType, lineReference, segment, segmentType)

We would like to have the option to view the following fields in Order Hub: reference, referenceType, lineReference, segment, segmentType.
over 2 years ago in Inventory Visibility 0 Future consideration

Tracing User Activity Across Multiple Sterling Applications

We are frequently receiving some requirements from the business regarding user activity for different applications(for ex: Call Center for Commerce, Sterling Business Center, IBM Store) which they are currently using. For some users we are pr...
over 4 years ago in OMS - Order Management (OnPrem & OMoC) 1 Future consideration

Store Associate should have visibility entire order when fulfillement is pending by another location (transfer to pick scenarios)

For orders which are partially fulfilled by a store (eg BOPIS order being partially transferred from another store or DC), the store user does not have visibility to the entire order picture, thus is unable to service the customer's request of fin...
over 4 years ago in Store Engagement / Usability 0 Future consideration

Any configuration information stored in the CCM database must be encrypted

Requirement stated by customer that all configured objects in the database must be encrypted. This includes audit information and any information containing IPs, host names and passwords. Whole-disk encryption, SAN storage encryption, and database...
over 2 years ago in Sterling Control Center Monitor 2 Future consideration

Customer requires complete encryption of all objects stored at rest in B2Bi/SFG database including trading partner information

Requirement has been stated by customer that all columns in the B2Bi/SFG database be encrypted, beyond what is hashed (passwords) and at-rest encryption (documents). This would include more recent sensitive information such as user names, IPs and ...
over 2 years ago in Sterling B2B Integrator 0 Future consideration