Chapter 3 Authentication for FortiOS 5.0
:
Configuring authenticated access
Configuring authenticated access
When you have configured authentication servers, users, and user groups, you are ready to configure security policies and certain types of VPNs to require user authentication.
This section describes:
•
Authentication timeout
•
Password policy
•
Authentication protocols
•
Authentication in security policies
•
Limited access for unauthenticated users
•
VPN authentication