Chapter 3 Authentication for FortiOS 5.0
:
Introduction to authentication
:
Types of authentication
:
Firewall authentication (identity-based policies)
:
Certificates
Certificates
Certificates can be used as part of an identity-based policy. All users being authenticated against the policy are required to have the proper certificate. See
“Certificate-based authentication”