Authentication policies can be defined based on the enabled authentication methods for users. The system supports hybrid authentication methods of Active Directory, LDAP, Radius and Iraje authentication(I-auth) for users.