Chapter 4 Authentication : Introduction to authentication : Types of authentication : Security policy authentication : Certificates
  
Certificates
Certificates can be used as part of a policy. All users being authenticated against the policy are required to have the proper certificate. See “Certificate-based authentication”