This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
SSP - User Lockout feature. SSP -> Credentials -> User Store -> User Lockout Threshold setting A user account is locked after a specified number of failed login attempts. The number of failed login attempts allowed is defined by the User ...
SSP Welcom Page *make change to force 1st time users to change password.
Looking for solution in SSP welcome page for HTTPS users to be forced to change password on initial login. Current versions don't account for attribute in LDS/AD if the account is defined with attribute of expired.. Allowing the user / password to...
Create Upgrade/Migration Process for SSP Engines/CMs
The SSP CM and Engines currently have to be on the same point release to function. This prevents a customer with a large installation base from gradually upgrading their environment. We have one CM with cold fail over and as many as 24 Engines att...
Configuration managment needs to have a schedule and approval process
Changes made in the configuration management interface should require an approval process that could make an external call for validation if needed. This would require a scheduling function as well as an approval process.
SCC needs a configuration reporting feature that allows users to determine the way in which objects are configured. Auditing of the application is an incredibly tedious process of checking every screen for every configuration item in the applicati...
Dictate cipher order for incoming HTTP transactions
We would like the ability within SSP to be able to dictate cipher order. Right now we have our security team testing our SSP nodes and when they test with the script here: https://testssl.sh/ Using version 2.9.5 we get back that the client can neg...
Allow Sterling Secure Proxy to perform URL Redirection for Reverse Proxy
Sterling Secure Proxy on Red Hat Linux version 2.6.32-696.1.1.el6.x86_64 is unable to route to different Outbound Nodes based on the URL that is sent to the proxy. Example (test vs prod at end of url):Incoming URL https:proxy.com:443/rosettanet/te...
More authentication mechanisms can be used for Sterling Secure Proxy to be monitored by SCC
In the Sterling Secure Proxy Configuration related documents, only the user/Password authentication mechanism to be used for the SSP to be monitored by the SCC. However this method might not be a good option, since the password can't be hold for a...
Messages are written to the auditlog.xml file (ACPT037I, ACPT040I and ACPT038I), as well as the sspengine.log file for the same activity. It is possible to reduce the frequency of these messages, but only to once every 10 minutes. It would be grea...
Do not place IBM confidential, company confidential, or personal information into any field.