MENU

VPN for MacOS

Students, Faculty, and Staff may access UMKC network resources from off-campus through the Global Protect Virtual Private Network (VPN) client. 

VPN Client Software

The Global Protect VPN client is available avalible below. Sign in with you UM System username and password and download the appropriate client for your operating system.


https://weblogon.umkc.edu/global-protect/login.esp

VPN Client Software

  1. You will be asked if you want to install the VPN Client. Click "Continue".

 

  1. Click "Continue" to install in the default destination.

  2.  

  1. The next screen will ask you to customize the installation. Click "Continue" to accept the defaults.

  2.  

  3. The next screen will ask you to confirm the installation of the VPN client. Click "Install"

  4.  

  1. You will be asked to enter a local administrator username and password. Click "Install" after entering these credentials.

  2.  

  3. The applicaiton will be installed.

  4.  

  1. Once the installation finishes, click "Move to Trash".

  2.  

  3. Click "Allow" on the notification prompt.

  4.  

    Mac VPN Client Usage

    1. The VPN Client requires that you have established a connection to the Internet before using it. 


    2. Click the globe icon in your finder bar. Enter weblogon.umkc.edu as the portal address. Click "Connect".
    3.  



    4. Enter your username in the format UMKCusername@umsystem.edu and password into the "Username" and "password" boxes respectively.  Click the "Sign In" button.

    5.  

    6. To confirm the VPN Client is connected, click the globe icon in your finder bar.



 


 



Terms of Use

A VPN connects your device to the UMKC network. This means it is visible to the world as part of the UMKC network which exposes it to the same threats as any device on the campus. These may include attempts to gain unauthorized access to your machine. Your device's vulnerability is determined by the security settings, policies and behaviors you employ in the use and management of the device. It is your responsibility to protect your device from unauthorized access.