This portal is to open public enhancement requests for IBM Sterling products and services. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
prioritizing routing of files, File A routing needs to take precedence over File B. Routing channel template is complex and burdensome. provided by Matt Moder
File ABC and File XYZ both hit their respective mailboxes in SFG at the same time or close to it. Both files use the same routing rule/ template (and associated business processes) File XYZ routing needs to take precedence over File ABC Once File ...
Protect SFG for event flood caused by large volume GET requests of very small fiels
When the File Gateway is hit by a very high amount of GET requests to download small files will cause an event flood. As these events are tracked in the visibility db, this may cause the system to "hang" - all threads blocked - as the visibility d...
Sterling Filegateway UI - to add an extra option "Both" for Authentication Type in User Account in Partner creation
In Sterling B2Bi UI, while User account creation we are having options Local, External and Both for Authentication Type. In Sterling B2Bi UI, if we opt option "Both" for external partners with whom we do password based authentication, and if we do...
Do not place IBM confidential, company confidential, or personal information into any field.