
A10 Control supports remote authentication and authorization through integration with external identity providers such as Okta and Azure Active Directory (Azure AD), directory services accessed via LDAP and LDAPS, and terminal-based authentication using TACACS+.
This integration enables secure Single Sign-On (SSO) and centralized user management, while A10 Control continues to enforce access through Role-Based Access Control (RBAC).
When remote authentication is enabled:
Authentication and Authorization Flow
Authentication is performed by any one of the following external providers, and the credentials are validated by the remote server:
IDP (Okta or Azure AD)
Directory server (LDAP/LDAPS)
TACACS+ server
After successful authentication, the IDP, directory, or TACACS+ server returns user profile attributes (such as group claims or access group mappings). A10 Control evaluates these attributes against its internal access group configurations to assign the appropriate roles and permissions.
Only Organization Admin have permission to configure remote authentication and authorization within A10 Control.
To enable remote authentication and authorization in A10 Control, perform the following steps:
Configure the Remote Authentication Server.
A10-Control-Access-Groups attributes for TACACS+ authorization. For more information, see TACACS+ Integration ☍.Create Access Groups in A10 Control using Manage Access Group.
Access groups define the operations a user can perform and the resources accessible within A10 Control. These groups must correspond to the groups or attributes returned by the remote provider:
/etc/tac_plus.conf file.For more information, see Role-Based Access Control (RBAC).
Configure Provider Attributes in A10 Control using Manage User Auth.
Specify the required IDP attributes (e.g., groups, amr, or LDAP DN) returned by the provider. These attributes are used by A10 Control to match users to the appropriate access groups.
Ask a test user to log in to the A10 Control portal with valid credentials for the chosen remote authentication method.
Upon successful login, verify the assigned role in:
The following topics are covered: