Wrapper script for OpenConnect supporting Azure AD (SAMLv2) authentication
Project description
openconnect-sso
Wrapper script for OpenConnect supporting Azure AD (SAMLv2) authentication
TL; DR
$ pip install openconnect-sso-$VERSION.whl
$ openconnect-sso --server vpn.server.com/group
Configuration
If you want to save credentials and get them automatically injected in the web browser:
$ openconnect-sso --server vpn.server.com/group --user user@domain.com
Password (user@domain.com):
[info ] Authenticating to VPN endpoint ...
User credentials are automatically saved to the users login keyring (if available).
If you already have Cisco Anyconnect set-up, then --server
argument is optional.
Also, the last used --server
address is saved between sessions so there is no need
to always type in the same arguments:
$ openconnect-sso
[info ] Authenticating to VPN endpoint ...
Configuration is saved in $XDG_CONFIG_HOME/openconnect-sso/config.toml
. On typical
Linux installations it is located under $HOME/.configopenconnect-sso/config.toml
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for openconnect_sso-0.3.1-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 127132ab26791432b58e1d11f3d24546cfec74a178295f2a3f23b98c449b0980 |
|
MD5 | 692f9e9dc3869b3998fb1e04e4174f3d |
|
BLAKE2b-256 | caef02d87530e052b8ddbd14ea1244580e1fb194018929ec735421e0e70c3190 |