Chapter 3 Authentication for FortiOS 5.0 : Configuring authenticated access : Authentication in security policies : Configuring authentication security policies
  
Configuring authentication security policies
To include authentication in a security policy, you must create an identity-based policy. An identity-based policy can authenticate by certificate, FSSO, and NTLM. The two exceptions to this are RADIUS SSO and FSSO Agents. See “SSO using RADIUS accounting records”, and “Introduction to FSSO agents”.
Before creating an identity-based security policy, you need to configure one or more users and firewall user groups.For more information, see “Users and user groups”.
Creating the security policy is the same as a regular security policy except you must select the action specific to your authentication method:
 
Table 22: Authentication methods allowed for each policy Action
Action
Authentication method
Where authentication is used
ACCEPT
FSSO Agent or identity-based policy — FSSO
identity-based policy — NTLM
identity-based policy — Certificates
RADIUS SSO
IPSEC
IPsec Phase 1 and 2
SSL-VPN
SSL certificates
DENY
none
none