To include authentication in a security policy, you must create an identity-based policy. An identity-based policy can authenticate by certificate, FSSO, and NTLM. The two exceptions to this are RADIUS SSO and FSSO Agents. See
“SSO using RADIUS accounting records”, and
“Introduction to FSSO agents”.
Before creating an identity-based security policy, you need to configure one or more users and firewall user groups.For more information, see
“Users and user groups”.
Creating the security policy is the same as a regular security policy except you must select the action specific to your authentication method: