This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
Ability to reject user access at proxy before authentication check
We would like the ability to create a proxy filter (blacklist) to block unknown user names that result in failed authentication attempts. Many of these attempts come from both domestic and foreign nations, so IP whitelisting is not useful to restr...
Support of Diffie Hellman Algorithm- Swithcing from SHA1 to SHA2
Tyco Electronics wants to switch over to SHA2 to trade with its partners. However the product doesn't support this feature. Not having SHA2 support in SSH handshake is preventing them to trade with their critical partners as some of their partners...
Support for multiple endpoints for partners migrating from legacy MFT to SFG
When migrating partners from legacy MFT platforms to SFG, a campaign is required to inform partner about the change of systems, and any change they would have to do at their end. Partners being migrated will have a test environment and prod enviro...
Allow for an upload of the CD export as text file for defining rules
Connect Direct Administration, File Agent Configuration:
There is no business justification for the time needed to rebuild a ser file should it ever become corrupt.
The File agent configuration has a nice feature to export to text. However the o...
Our clients who are transferring from Connect:Direct are using windows.However, because of the smaller lrecl of the file being transferred, it will not be compressed for the following third specification: 1) CD z/OS to CD z/OS transfer will be in ...
SSP to support 9000+ IPs/range nodes in Inbound Netmaps for all protocols
Currently, we have 9000+ IPs/CIDR ranges to allow the traffic from. We have added 9000+ entries in Netmap nodes but when we try to edit/save/add more nodes manually the SSP CM GUI is hanging/breaks/not responding properly/going to inoperable state...
Add new function handlers to the product - They already exist a custom code
There are 6 function handlers that we already implemented at several projects as custom code
Get Value by Position
The details of these function handlers can be found on:...
POP3 SSL is useful to send and receive email using SSL , to securize data transmission by email as it will be encrypted as it is transmitted.
Most activity sectors would benefit from this feature .
For POP3 SSL , the certificates would be in the...
Do not place IBM confidential, company confidential, or personal information into any field.