Provision to an A10 Thunder ADC
Table of Contents
Expand all | Collapse all
-
- Activate Next-Generation Trust Security
-
-
- Configure AWS connection
- Configure Azure Key Vault connection
-
- Workload Identity Federation authentication
- Workload Identity Federation - Azure Identity Provider authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Workload Identity Federation authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Supported OIDC claims
-
-
-
-
- Create an F5 BIG-IP LTM machine
- Create a Microsoft Azure Private Key Vault machine
- Create a Microsoft IIS machine
- Create a Microsoft Windows (PowerShell) machine
- Create a Microsoft SQL Server machine
- Create a Common KeyStore machine
- Create a Citrix ADC machine
- Create an Imperva WAF machine
- Create a VMware NSX Advanced Load Balancer (AVI) machine
- Create an A10 Thunder ADC machine
- Create a Cloudflare machine
- Create Kemp Virtual LoadMaster machine
- Create a Palo Alto Panorama machine
-
- Provision to an F5 BIG-IP LTM
- Provision to a Microsoft Azure Private Key Vault
- Provision to Microsoft IIS
- Provision to Microsoft Windows (PowerShell)
- Provision to Microsoft SQL Server
- Provision to a Common KeyStore
- Provision to a Citrix ADC
- Provision to an Imperva WAF
- Provision to VMware NSX Advanced Load Balancer (AVI)
- Provision to an A10 Thunder ADC
- Provision to Cloudflare
- Provision to a Kemp Virtual LoadMaster
- Provision to Palo Alto Panorama
-
-
- 47-Day Validity Readiness TLS Certificates dashboard
- About the Certificate Inventory
- Managing certificate lifecycle settings
- Reissuing certificates in Next-Gen Trust Security
- Downloading certificates, certificate chains, and keystores
- Retiring, recovering, and deleting certificates
- Finding certificates in the certificate inventory
- Importing certificates from a CA using EJBCA
- Notification Center overview
- Domain-based validation for external emails
- Managing user accounts
- Troubleshooting
Provision to an A10 Thunder ADC
Use this procedure to provision a certificate from Next-Gen Trust Security to an A10 Thunder ADC machine.
- Sign in to Next-Gen Trust Security.
- Click Insights > Machines.
- Select the A10 Thunder ADC machine you want to provision a certificate to.
- Click Provision a certificate.
- From Choose a certificate from the inventory, search for and select the certificate you want to provision.Verify that you selected the correct certificate by reviewing the Subject DN, Validity, and Fingerprint.
- (Optional) In Client SSL Template Name, enter the client SSL template name used by the A10 Thunder ADC client virtual port.Note: If you leave this field empty, Next-Gen Trust Security automatically generates a client SSL template name.
- In Virtual Server Name, enter the name you want the certificate to use on the A10 Thunder ADC.What if the virtual server name is already in use?When provisioning a certificate, Next-Gen Trust Security checks whether the name is already in use on the A10 Thunder ADC:
- If the name is not in use, it is applied as entered.
- If the name is already in use by the same certificate, that certificate is reused.
- If the name is in use by a different certificate, Next-Gen Trust Security creates a new certificate name by appending the expiration date and a unique value (for example, my-cert-name_22Oct05_3117).
- In Virtual Port Number, enter the port number.
- In Virtual Port Protocol, enter the protocol. If left blank, HTTPS is used by default.
- (Optional) To prevent the certificate from being pushed immediately, set Push upon saving to No.
- Click Save.
After saving, Next-Gen Trust Security provisions the certificate to the specified A10 Thunder ADC virtual server and creates an installation record on the Installations tab.