Chapter 4 Authentication
:
Introduction to authentication
:
Types of authentication
:
Security policy authentication
:
Certificates
Certificates
Certificates can be used as part of a policy. All users being authenticated against the policy are required to have the proper certificate. See
“Certificate-based authentication”