Wrapper script for OpenConnect supporting Azure AD (SAMLv2) authentication to Cisco SSL-VPNs
Project description
openconnect-sso
Wrapper script for OpenConnect supporting Azure AD (SAMLv2) authentication to Cisco SSL-VPNs
TL; DR
$ pip install openconnect-sso
$ openconnect-sso --server vpn.server.com/group
Configuration
If you want to save credentials and get them automatically injected in the web browser:
$ openconnect-sso --server vpn.server.com/group --user user@domain.com
Password (user@domain.com):
[info ] Authenticating to VPN endpoint ...
User credentials are automatically saved to the users login keyring (if available).
If you already have Cisco AnyConnect set-up, then --server
argument is optional.
Also, the last used --server
address is saved between sessions so there is no need
to always type in the same arguments:
$ openconnect-sso
[info ] Authenticating to VPN endpoint ...
Configuration is saved in $XDG_CONFIG_HOME/openconnect-sso/config.toml
. On typical
Linux installations it is located under $HOME/.configopenconnect-sso/config.toml
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for openconnect_sso-0.3.4-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1db99f7a3c386c73152f87ccafbbba79ad9bb4627203687348632e50329ffbf8 |
|
MD5 | 55185b34246af0353dd45fd5750219ac |
|
BLAKE2b-256 | d0ba97b1f99628f2ec825528504f16024441692cf7519e9ec45d7b51d4c7f81c |