This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
Add verification on security level of signatureMethod/digestMethod
On XML Digital Signature service, you can choose which signature and digest method to use when signing; http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 https://www.w3.org/2001/04/xmldsig-more#rsa-sha1 However, when using the service in verify mo...
We received the alert for expired certificate in email. We mistakenly removed the expired document encryption cert doccrypto2. After we worked with the support and we found out this cert is required and even it is expired. Our problem is if this i...
Audit record/log for the SQL statement executed via db_exec.sh and db_execFile.sh scripts
Hi Team, Currently in Sterling B2B Integrator there is no audit records/logs for the SQL statements executed via scripts db_exec.sh and db_execFile.sh. We have verified the logs and ADMIN_AUDIT table and could not find any audit trial for the SQL ...
Custom HTTP Headers Response for B2B Sterling Integrator Applications
Web Application Security is always evolving and new vulnerabilities and hardening futures are being created continously. Many of the vulnerabilities remediation are based of add parameters in the HTTP Response Header. For example: Content-Security...
We are starting to see more and more customers want to move to SSH Key only auth, however, we are not set to that today, nor are all of our customers ready/willing to make that switch. Since the authentication requirement is set at a system level,...
Do not place IBM confidential, company confidential, or personal information into any field.