Skip to content

Wrapper script for openconnect supporting Azure AD (SAMLv2) authentication

License

Notifications You must be signed in to change notification settings

patrickmarlier/openconnect-sso

 
 

Repository files navigation

openconnect-sso

Wrapper script for OpenConnect supporting Azure AD (SAMLv2) authentication to Cisco SSL-VPNs

TL; DR

$ pip install openconnect-sso
$ openconnect-sso --server vpn.server.com/group

Configuration

If you want to save credentials and get them automatically injected in the web browser:

$ openconnect-sso --server vpn.server.com/group --user [email protected]
Password ([email protected]):
[info     ] Authenticating to VPN endpoint ...

User credentials are automatically saved to the users login keyring (if available).

If you already have Cisco AnyConnect set-up, then --server argument is optional. Also, the last used --server address is saved between sessions so there is no need to always type in the same arguments:

$ openconnect-sso
[info     ] Authenticating to VPN endpoint ...

Configuration is saved in $XDG_CONFIG_HOME/openconnect-sso/config.toml. On typical Linux installations it is located under $HOME/.config/openconnect-sso/config.toml

About

Wrapper script for openconnect supporting Azure AD (SAMLv2) authentication

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 99.9%
  • JavaScript 0.1%