- Visit the GlobalProtect web portal .
- Enter your Princeton NetID, your password, and click Log in.
- The system will send a Duo request to your default device. ...
- The GlobalProtect portal page displays with 'tiles' for the set of protected applications accessible through the portal.
Do I need a VPN for remote access to Princeton?
You then have secure, authenticated remote access to Princeton services while keeping Princeton’s resources safe. If you are dealing with sensitive information related to Princeton in a public space (e.g., while traveling or using Wi-Fi in an airport or café), a VPN will provide you with additional security.
Why can't I access certain resources on Princeton's network?
If you are having problems with a specific resource please include the URL you are trying to access in your message. Virtual Private Network (VPN) services are managed by Princeton's Office of Information Technology (OIT) These require installing and configuring software compatible with your computer's operating system.
How can I access the library remotely?
The Library offers two means of remote access EZproxy, and through the University's VPN Services. A select number of electronic resources are also available to Alumni. The EZproxy service requires no configuration.
How do I connect to a Princeton Server?
Click on Finder on the menu bar. Click on Preferences. On the Sidebar tab, make sure “Connected servers” is checked under Locations. Close the Preferences window. On the menu bar, click Go. Click Connect to Server. In the Server address box, enter: smb://files.princeton.edu/dept and click Connect. Login with your Princeton NetID and password.
How to access Princeton protected applications?
The easiest way to access protected applications is through the GlobalProtect Portal on the web. For this, all you need is a web browser. Some Princeton applications available through this portal are:
How can I access the Central File Server remotely?
Please note: If you are off campus, you will need to make a VPN connection to the University before accessing the Central File Server. Once a VPN connection is established, follow the instructions below to access drives.
How long does GlobalProtect VPN take to work?
Using GlobalProtect software to access protected services. Important! When using GlobalProtect VPN, the service is set to time out after 3 hours of inactivity from you in the VPN tunnel. The service is also set to timeout after 12 hours of connection, after which you will be required to re-login to reconnect.
How to download GlobalProtect Agent?
To download, click on the GlobalProtect Agent (upper-right corner). Select your operating system (OS): Download Windows 64 bit GlobalProtect agent. Note: 32-bit Windows devices are rare these days. To verify whether your system is 32 or 64 bit, open the Settings app on your computer, then click System, About.
Can you use Global Protect on Windows Store?
Please DO NOT use the Global Protect client from the Windows store.
Can Sonicwall VPN access library resources?
Library digital resources hosted by external vendors cannot be accessed using the Global Protect VPN. At this time, continue to use SonicWall VPN to access these resources.
When to GlobalProtect VPN
When sharing or accessing University information from off-campus—especially when on wifi in a public place, or when sharing Restricted or Confidential information—use Princeton's Global Protect VPN. GlobalProtect VPN provides anytime access to the University network. It also leverages existing network security tools, including the firewall.
How to Use It
The easiest way to access protected applications is through the GlobalProtect Portal on the web. For this, all you need is a web browser. Some Princeton applications available through this portal are:
Accessing protected applications using software installed on your device
You will need to install GlobalProtect software to access a subset of Princeton’s protected resources, including:
What is a VPN in Princeton?
Virtual Private Network (VPN) services are managed by Princeton's Office of Information Technology (OIT) These require installing and configuring software compatible with your computer's operating system. At the present time only the "SonicWall Secure Mobile Access VPN" option on OIT's page is fully compatible with all Library electronic resources so please utilize that option for your research. Instructions for Windows, OS X, Linux, and mobile devices are provided. A VPN service enables the computer you are using when connected to function as if it was a part of the campus network. In addition to SonicWall OIT also offers the Global Protect VPN for use for staff and students who need to join the campus network, however at the present time that service is not compatible with many of the resources for research that the Library provides. SonicWall is the best choice if you wish to do Library research using SRA. See EZProxy if you are looking for an alternative remote research option.
What is the library's electronic resources?
Most of the Library's electronic resources are available to registered students, faculty, and staff when away from campus, including while abroad. The Library offers two means of remote access EZproxy, and through the University's VPN Services. A select number of electronic resources are also available to Alumni.
Does Sonicwall OIT have VPN?
In addition to SonicWall OIT also offers the Global Protect VPN for use for staff and students who need to join the campus network, however at the present time that service is not compatible with many of the resources for research that the Library provides.
Why are we offering secure file sending services?
Email exchanged between a Princeton University email account and one managed by any organization outside of the Princeton network is insecure. The message and attachments passing between the sender's and recipient's email systems are in a form that can be read by anyone with access to the computers through which the email travels.
What are my secure file sharing options at Princeton?
Use the following diagram to determine the best option for your specific scenario, and click the corresponding links below the diagram for step-by-step instructions.