
Lightweight Directory Access Protocol (LDAP) and its secure variant (LDAPS) can be configured as external authentication and authorization sources for user login to A10 Control.
When integrated with an OIDC-based Identity Provider (IDP), LDAP/LDAPS can support Multi-Factor Authentication (MFA) through an LDAP proxy server. The proxy intermediates LDAP authentication traffic and securely forwards it to the OIDC IDP for MFA enforcement, without requiring changes to the A10 Control application or the underlying LDAP directory.
Key Benefits
Centralized user authentication and authorization through a single LDAP/LDAPS directory.
Encrypted LDAPS ensures secure transmission of credentials and directory queries.
MFA enforcement through an LDAP proxy integrated with external IDPs (e.g., Okta, Azure AD).
Direct mapping of LDAP groups to A10 Control Access Groups for role-based access control.
Prerequisites
LDAP: TCP port 389
LDAPS: TCP port 636
An OIDC integration set up with the LDAP proxy server for MFA enforcement.
A user can belong to multiple LDAP groups:
If mapped to multiple access groups, the group with the higher access level takes precedence.
If two access groups grant the same level of access, one is chosen randomly.
To avoid ambiguity, configure exclusive group-role mapping on both the LDAP server and A10 Control.
When LDAP Authorization is enabled, access in A10 Control is managed by mapping LDAP groups to access groups, with each Access Group mapped to exactly one LDAP group (one-to-one mapping).
When LDAP is integrated through an OIDC-based proxy server (such as Okta or Azure AD), MFA is enforced by the proxy server before user access is granted.
Only Organization Admins have permission to configure LDAP/LDAPS with A10 Control.
After the LDAP directory server is configured, you must perform the following configuration steps in A10 Control:
Create LDAP access groups and map them to the IDP (LDAP) group using Manage Access Group.
Ensure that the A10 Control access group name exactly matches the corresponding LDAP group name (case-sensitive).
Configure LDAP directory server attributes in A10 Control using Manage User Auth.
If using LDAPS, upload the LDAPS server certificate. Although the certificate is uploaded per Organization, it is stored in a global truststore. As a result, the certificate applies across all Organizations, not just the one where it was uploaded.
For MFA enforcement, map LDAP groups through the IDP (proxy server).
In your chosen IDP (for example, Okta or Azure AD), configure the Groups claim to include both LDAP-proxy groups and native IDP groups. This typically requires entering a custom expression or filter provided by the IDP.
Examples
Okta - The integration process is the same as a standard Okta IDP configuration, except you must provide a custom Expression Value for the Group Claim:
|
Field |
Value |
|---|---|
|
Value type |
Expression |
|
Value |
Replace |
For more information, see Okta Integration.
Azure AD - The integration process is the same as a standard Azure AD configuration for the Groups claim. You can include security groups or groups assigned to the application in the ID and Access Tokens. Optionally, apply a prefix filter (for example, a10-) to organize group claims for A10 Control.
For more information, see Azure Active Directory Integration.