Multi-Tenancy and Access Control

A10 Control is inherently multi-tenant, meaning it can segregate management across different teams or customer groups securely. In a multi-tenant setup, different administrators may have authority over different subsets of devices or partitions, without visibility into others. This is achieved through a combination of a hierarchical administrative scope model and a robust Role-Based Access Control (RBAC) system.

This section explains how A10 Control defines administrative scopes (or personas) and how roles and permissions are structured.

Tenant Hierarchy: Organizations and Org Units

The primary structure for multi-tenancy in A10 Control is a two-level hierarchy:

Partition Admin Role and Logical Partitions

There are two types of partitions that can be created to segment ACOS device, Layer 3 Virtualization (L3V) partitions are network-enabled partitions. and Service partitions (SvP) are non-network-enabled partitions. For more information about partition, see Application Delivery Partitions Guide.

The Service Partition can be created within the actual Shared Partition of a Thunder device. Multiple Service Partitions can be created within a Shared Partition. Some application services run on these Service Partitions and some can still remain within the Shared Partition.

After a Thunder device is registered in A10 Control, these Service Partitions must be mapped to Logical Partitions. The Logical Partitions become resources that can be accessed by users with Partition Admin role.

COMPANY INFORMATION: Copyright © 2025 A10 Networks, Inc. All Rights Reserved. Legal Notice