Terminal Access Controller Access-Control System Plus (TACACS+) is a supported protocol for external authentication and authorization in A10 Control. TACACS+ server integration allows A10 Control delegate both authentication and authorization externally. The TACACS+ server validates user credentials, applies role-based authorization, and enforces access policies.
Only Organization Admins have permission to integrate the TACACS+ server with A10 Control.
Before integrating TACACS+ server with A10 Control, ensure the following:
etc/tac_plus.conf file.tac_plus.conf.tac_plus.conf with appropriate login credentials.Assign A10 Control–specific attributes to each user with the parameter:
A10-Control-Access-Groups="<provider account>:<access group>|..."
priv-lvl) is set to the appropriate value (For example, 15 for admin-level access).A10-Control-Access-Groups attribute in the user configuration block to define access within A10 Control.Update the TACACS+ configuration file (/etc/tac_plus.conf) with the following details:
tac_plus.conf snippet:
user = user1 {
default service = permit
name = "user1"
login = cleartext password
pap = cleartext password
service = exec {
A10-Control-Access-Groups="root:hc_provider_adminroot|providerB:hc_provider_adminproviderB|P1-Rds:hc_provider_admin-P1-Rds|p5:hc_provider_admin-p5"
priv-lvl=15
}
}
The following table lists the TACACS+ privilege levels (priv-lvl) that match the GUI roles.
| GUI Access Role | TACACS+ Privilege Levels |
|---|---|
|
ReadWriteAdmin |
15 |
|
SystemAdmin |
14 |
|
NetworkAdmin |
13 |
|
NetworkOperator |
12 |
|
SlbServiceAdmin |
11 |
|
SlbServiceOperator |
10 |
|
ReadOnlyAdmin |
0 |
|
PartitionReadWrite |
9 |
|
PartitionNetworkOperator |
8 |
|
PartitionSlbServiceAdmin |
7 |
|
PartitionSlbServiceOperator |
6 |
|
PartitionReadOnly |
5 |