Wrapper script for OpenConnect supporting Azure AD (SAMLv2) authentication to Cisco SSL-VPNs
Project description
openconnect-sso
Wrapper script for OpenConnect supporting Azure AD (SAMLv2) authentication to Cisco SSL-VPNs
TL; DR
$ pip install openconnect-sso
$ openconnect-sso --server vpn.server.com/group
Configuration
If you want to save credentials and get them automatically injected in the web browser:
$ openconnect-sso --server vpn.server.com/group --user user@domain.com
Password (user@domain.com):
[info ] Authenticating to VPN endpoint ...
User credentials are automatically saved to the users login keyring (if available).
If you already have Cisco AnyConnect set-up, then --server
argument is optional.
Also, the last used --server
address is saved between sessions so there is no need
to always type in the same arguments:
$ openconnect-sso
[info ] Authenticating to VPN endpoint ...
Configuration is saved in $XDG_CONFIG_HOME/openconnect-sso/config.toml
. On typical
Linux installations it is located under $HOME/.config/openconnect-sso/config.toml
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for openconnect_sso-0.3.9-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | dc23f884ef99bbd62f4af4dabdadd4ee52effec6e3c1b9b9e01f66365f68784b |
|
MD5 | ed9861797f4eeb58e5c481483fd595a8 |
|
BLAKE2b-256 | 4328976e35f6f906be319b377000040c84ecffc39c67c9c16fdd6ba5eb527a41 |