

VPN TO CONNECT TO OFFICE FOR MAC INSTALL
From that link, choose the version of software needed for your device and install the client.A page will load giving you the option to download the VPN software by clicking on “GlobalProtect Agent” at the top-right of the screen.If your credentials don't work, please reset your password via TrueYou.Fill in your TrueYou Credentials (8-digit NUID and password).Please refer to the guides for more specific details.

The guides above provide greater detail, but in general, here is the information for connecting. To register with TrueYou Two-Factor Authentication use these instructions or visit the Two-Factor support page for videos and additional help topics. Verifying your identity using a second factor (like your phone or other mobile device) prevents anyone but you from logging in, even if they know your password. 2FA is a second layer of security to your online accounts.
VPN TO CONNECT TO OFFICE FOR MAC ANDROID
Some selected Linux versions, as well as Android and iOS devices, also work with the VPN.Įnrolling in TrueYou Two-Factor Authenticationīefore you connect to the NU VPN, you must be enrolled in TrueYou Two-Factor Authentication (2FA). The Palo Alto GlobalProtect VPN client and service will work under current NU-supported Mac and Windows versions. It is a VPN client that works on a wide variety of operating systems and hardware configurations. NU Information Technology Services currently supports Palo Alto's GlobalProtect VPN. VPN technology via the public Internet has replaced the need to requisition and maintain expensive dedicated leased-line telecommunication circuits once typical in wide-area network installations.

VPNs may serve any network functionality that is found on any network, such as sharing of data and access to network resources, printers, databases, websites, etc.Ī VPN user typically experiences the central network in a manner that is identical to being connected directly to the central network. VPNs typically require remote users of the network to be authenticated, and often secure data with encryption technologies to prevent disclosure of private information to unauthorized parties.
