Change Summary

Enforce multi-factor authentication (MFA) on all SSL-VPN connections through the Palo Alto GlobalProtect gateway. Authentication will be delegated to the institutional SAML IdP, which already supports TOTP and push-notification MFA for all staff and faculty accounts.

Change Type: Standard
Risk Level: Medium–High (user-facing; requires user action before cutover)
Rollback Available: Yes (MFA enforcement flag can be disabled in under 5 minutes)

Business Justification

Password-only VPN access is identified as a critical gap in the institution’s security posture. Five of the last eight reported credential compromise incidents involved VPN credentials obtained through phishing. Enforcing MFA closes this vector and aligns with NIST SP 800-63B Level 2 assurance requirements.

Scope

  • Affected Users: All ~2,400 staff and faculty who use SSL-VPN
  • Affected Systems: Palo Alto GlobalProtect gateway (both nodes)
  • Not Affected: Students on the guest VPN pool (separate policy)

Pre-Change Requirements

All VPN users must have an MFA method registered in the identity portal before the cutover date. The following communication plan has been approved:

DateAction
April 1–10Email campaign prompting users to register an MFA method
April 12Reminder email; MFA portal linked prominently on the VPN landing page
April 18Final warning email; Help Desk staffed for extended hours
April 20MFA enforcement enabled at 8:00 PM

Implementation Steps

  1. Enable SAML authentication profile on GlobalProtect gateway
  2. Set authentication policy order: SAML IdP before local password fallback
  3. Enable MFA enforcement flag in the GlobalProtect policy
  4. Confirm authentication events appear in SIEM within 5 minutes
  5. Validate with a test account using TOTP and push notification

Rollback Plan

Disable the MFA enforcement flag in the GlobalProtect policy (estimated 5 minutes). Local password authentication will resume immediately. Rollback is available for 72 hours post-change.

Testing

  • Tested in non-production VPN environment with 15 volunteer users ✓
  • Confirmed TOTP and push notification flows work correctly ✓
  • Confirmed failed MFA attempts are logged to SIEM ✓
  • Help Desk briefed on common user issues and resolutions ✓

Open Items

  • CAB review scheduled for April 5, 2026
  • User communication emails require final approval from Communications