Wrapper script for OpenConnect supporting Azure AD (SAMLv2) authentication to Cisco SSL-VPNs
Project description
openconnect-sso
Wrapper script for OpenConnect supporting Azure AD (SAMLv2) authentication to Cisco SSL-VPNs
TL; DR
$ pip install openconnect-sso
$ openconnect-sso --server vpn.server.com/group
Configuration
If you want to save credentials and get them automatically injected in the web browser:
$ openconnect-sso --server vpn.server.com/group --user user@domain.com
Password (user@domain.com):
[info ] Authenticating to VPN endpoint ...
User credentials are automatically saved to the users login keyring (if available).
If you already have Cisco AnyConnect set-up, then --server
argument is optional.
Also, the last used --server
address is saved between sessions so there is no need
to always type in the same arguments:
$ openconnect-sso
[info ] Authenticating to VPN endpoint ...
Configuration is saved in $XDG_CONFIG_HOME/openconnect-sso/config.toml
. On typical
Linux installations it is located under $HOME/.config/openconnect-sso/config.toml
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for openconnect_sso-0.3.6-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 8bea89f3a6c80f3e9144cb2429d00569d495c2230c210f78dc03dacef3942c88 |
|
MD5 | 23d870206a93830006358e05c6a515e3 |
|
BLAKE2b-256 | 52da46b6f9ffc7a0725fd752f5fd90fd683eabb08a426d112ce8f9eeba2e8b53 |