Chapter 3 Authentication for FortiOS 5.0 : Introduction to authentication : Types of authentication : Firewall authentication (identity-based policies) : Certificates
  
Certificates
Certificates can be used as part of an identity-based policy. All users being authenticated against the policy are required to have the proper certificate. See “Certificate-based authentication”