This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
Issue a message when CDz reached NODE Specific Max PARSESS Limit
CDz does issue SVTM082I when CDz as node hit the node specific SESS.SNODE.MAX. However, it doesn't issue any message when it reached Max PARSESS. Could you add a corresponding message for this so that we can easily figure out it hit the limit?
In my retail company ABC, an associate can work in multiple stores on different days of week or re-assigned temporarily to work on different store. Apart from store associates, there are district managers (and admin users) who would need to see activities happening in all stores assigned to the district ( or all stores for admin users )
In my retail company ABC, an associate can work in multiple stores on different days of week or re-assigned temporarily to work on different store. Apart from store associates, there are district managers (and admin u...
Ability to reject user access at proxy before authentication check
We would like the ability to create a proxy filter (blacklist) to block unknown user names that result in failed authentication attempts. Many of these attempts come from both domestic and foreign nations, so IP whitelisting is not useful to restr...
Support for multiple endpoints for partners migrating from legacy MFT to SFG
When migrating partners from legacy MFT platforms to SFG, a campaign is required to inform partner about the change of systems, and any change they would have to do at their end. Partners being migrated will have a test environment and prod enviro...
Support of Diffie Hellman Algorithm- Swithcing from SHA1 to SHA2
Tyco Electronics wants to switch over to SHA2 to trade with its partners. However the product doesn't support this feature. Not having SHA2 support in SSH handshake is preventing them to trade with their critical partners as some of their partners...
Do not place IBM confidential, company confidential, or personal information into any field.