Chapter 4 Authentication : Configuring authenticated access : Authentication in security policies
  
Authentication in security policies
Security policies control traffic between FortiGate interfaces, both physical interfaces and VLAN subinterfaces. The firewall tries to match the session’s user or group identity, device type, destination, etcetera to a security policy. When a match is found, the user connects to the requested destination. If no security policy matches, the user is denied access.
A user who has not already been authenticated by a captive portal, FSSO, or RSSO can match only policies where no user or user group is specified. If no such policy exists, the firewall requests authentication. If the user can authenticate and the session can be matched to a policy, the user connects to the requested destination, otherwise, the user is denied access.
This section includes:
Enabling authentication protocols
Authentication replacement messages
Access to the Internet
Configuring authentication security policies
Identity-based policy
NTLM authentication
Certificate authentication
Restricting number of concurrent user logons