One can authenticate via LDAP/AD for VPN (It' s even an FCNSP exam question)
 
 This via defining a LDAP connector to an AD. So define a LDAP in the GUI and define Bind DN user / password in the CLI. 
 
 Works fine, I believe there' s also a white paper that decribes this. 
 
 Alternatively you can authenticate via radius on IIS. 
 
 
 Below an old post on IIS/Radius auth
 
 Requirements/assumptions: 
 •	Windows Server 2003, Standard Edition 
 •	Fortigate-60 2.80, MR7, build318, 041206 
 •	FortiClient 1.2.172
 
 Windows 2003 Server: 
 •	Install the Internet Authentication Service (IAS); it will act as our RADIUS server 
 - see http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/sag_ias_install.asp 
 •	Note: I had to reboot the server after installing IAS 
 •	Register the IAS in Active Directory 
 - see http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/sag_ias_add_activedir.asp 
 •	Open the IAS and create a new RADIUS-Client 
 - Address: <IP address of FortiGate unit> 
 - Client-Vendor: RADIUS Standard 
 - Do not enable " Message Authenticator"  
 - Shared Key: <FG60 supports a maximum of 15 characters> 
 •	Create a remote access policy 
 - Contraints: for the first connection attempt you may add only the IP of the FortiGate as " Client-IP-Address"  
 - Profile: edit the profile and enable PAP authentication 
 - see http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/sag_nap_node2.asp 
 •	Go to your user accounts 
 - Check if your users are able to dial-in 
 - In my case, the dial-in access is controlled by RAS policy 
 - You don' t have to enable " reversible encryption" , because we will use PAP not CHAP 
 •	Note: You may have to switch your domain from mixed to native mode to enable RAS policies
 
 More infos on IAS: 
 •	http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/sag_ias_howto_top.asp 
 •	http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/sag_ias_checklist_corp.asp 
 •	http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/sag_IAStopnode.asp
 
 FortiGate: 
 •	Login via SSH to the CLI 
 •	Enter the following commands: 
  config user radius 
      edit " MyRADIUS"  
          set secret SecretKey 
          set server " IP address of radius server"  
      next 
  end
 
 •	Note: the secret must match the shared key on the IAS and is limited to 15 characters 
 •	Note: You can also enter the configuration via the web interface. Goto " User -> RADIUS"  and create a new entry.
 
 Test from the FortiGate: 
 •	You should now be able to successfully authenticate against the RADIUS server 
 •	Enter the following CLI command to test the authentication: 
  diagnose test authserver radius MyRADIUS pap ' windowsuser'  ' password' 
 
 •	Note: " MyRADIUS"  is the name of our radius server defined above 
 •	Note: You don' t have to quote the username and the password 
 •	Example: 
 If your windows username is jack and the password is test123, the diagnose command would look like: 
  diagnose test authserver radius MyRADIUS pap jack test123
 
 And the response should be: 
  authenticate ' jack'  against ' pap'  succeeded!
 
 •	Check the event log of the windows server for IAS entries (under " System" ) 
 - http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/sag_ias_logproc1.asp
 
 Test from a client: 
 •	You should also be able to test the authentication from another client 
 •	You can use the NTRadPing 1.5 RADIUS Test Utility 
 - Get it from http://www.novell.com/coolsolutions/tools/1932.html 
 •	Note: Don' t forget to to add a new RADIUS client in your IAS configuration with the IP address of your client 
 •	Check the event log of the windows server for IAS entries (under " System" ) 
 - http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/sag_ias_logproc1.asp
 
 If you get any errors: 
 •	The event log entries are usually very detailed 
 •	If you get error code 16 
 - check the shared key 
 - check the windows password for typos 
 •	If you get error code 65 
 - check your RAS policy 
 - check if the correct RAS policy is applied 
 - check if dial-in access is enabled for the user 
 •	You can also enable " tracing"  on the RADIUS server 
 - http://www.microsoft.com/technet/security/topics/cryptographyetc/secmod192.mspx
 
 Back to the FortiGate: 
 •	If authentication is successfull, we can configure the VPN tunnel 
 •	Configure a user group 
  config user group 
      edit " ugDialupUsers"  
              set member " MyRADIUS"  
          set profile " strict"  
          set types-in-group 1 
      next 
  end
 
 •	Note: We make the RADIUS server the only member of the group, so the whole remote access is controlled by the RAS policy on the RADIUS/IAS Server 
 •	Now we need a Phase1 policy which XAuth enabled 
  config vpn ipsec phase1 
      edit " gwDialupUsers"  
          set dpd enable 
          set nattraversal enable 
          set proposal aes192-sha1 
          set type dynamic 
          set xauthtype pap 
          set authusrgrp " ugDialupUsers"  
          set psksecret SharedSecret 
      next 
  end
 
 •	Note: You also need to define a Phase2 tunnel and a firewall policy 
 •	Note: You can of course also enter the configuration via the web interface (goto " VPN -> IPSEC" )
 
 FortiClient: 
 •	Configure the appropriate connection 
 •	Don' t forget to enable " eXtended Authentication"  (under " Advanced" ) 
 •	Test the connection
 
 Debug: 
 •	If you still have problems you can enable the debug mode 
 •	Login to the FortiGate via SSH and enter 
  diagnose debug enable  
  diagnose debug console timestamp enable 
  diagnose debug app ike 2
 
 •	Test the FortiClient connection 
 •	Carefully watch the output on the FortiGate console 
 - see http://kc.forticare.com/default.asp?id=115&Lang=1
 
 Security: 
 •	Why PAP 
 - see http://www.freeradius.org/faq/ 
 •	The communication between the FortiGate and the RADIUS Server is secured by the shared secret 
 - see http://www.freeradius.org/rfc/rfc2865.html 
 •	The communication between the FortiClient and the FortiGate is secured by the VPN connection 
 - see http://kc.forticare.com/default.asp?id=115&Lang=1