17
0
Go to file
2020-01-25 16:55:45 -08:00
gp-saml-gui.py extensive cleanup, more logging 2020-01-25 16:55:45 -08:00
LICENSE initial commit 2019-09-16 19:57:48 -07:00
README.md Add installation notes 2019-10-18 17:06:53 -07:00
requirements.txt add requirements.txt 2019-10-18 21:20:02 -07:00
test-globalprotect-login.py this script should live here 2020-01-25 16:46:12 -08:00

gp-saml-gui

This is a helper script to allow you to interactively login to a GlobalProtect VPN that uses SAML authentication.

Interactive login is, unfortunately, sometimes a necessary alternative to automated login via scripts such as zdave/openconnect-gp-okta.

Installation

gp-saml-gui uses GTK, which requires Python 3 bindings.

On Debian / Ubuntu, these are packaged as python3-gi, gir1.2-gtk-3.0, and gir1.2-webkit2-4.0:

$ sudo apt install python3-gi gir1.2-gtk-3.0 gir1.2-webkit2-4.0

Then, set up a virtual environment that can access these system packages, activate it, and install the Python dependencies:

$ virtualenv --python=python3 --system-site-packages venv
$ . venv/bin/activate
$ pip install requests

How to use

Specify the GlobalProtect server URL (portal or gateway) and optional arguments.

This script will pop up a GTK WebKit2 WebView window. After you succesfully complete the SAML login via web forms, the script will output HOST, USER, and COOKIE variables in a form that can be used by OpenConnect (similar to the output of openconnect --authenticate):

$ eval $( gp-saml-gui.py -v vpn.company.com )
Got SAML POST content, opening browser...
Finished loading about:blank...
Finished loading https://company.okta.com/app/panw_globalprotect/deadbeefFOOBARba1234/sso/saml...
Finished loading https://company.okta.com/login/sessionCookieRedirect...
Finished loading https://vpn.qorvo.com/SAML20/SP/ACS...
Got SAML relevant headers, done: {'prelogin-cookie': 'blahblahblah', 'saml-username': 'foo12345@corp.company.com', 'saml-slo': 'no', 'saml-auth-status': '1'}

SAML response converted to OpenConnect command line invocation:

    echo 'blahblahblah' |
        openconnect --protocol=gp --user='foo12345@corp.company.com' --usergroup=prelogin-cookie:gateway --passwd-on-stdin vpn.company.com

$ echo $HOST; echo $USER; echo $COOKIE
https://vpn.company.com/gateway:prelogin-cookie
foo12345@corp.company.com
blahblahblah'

$ echo "$COOKIE" | openconnect --protocol=gp -u "$USER" --passwd-on-stdin "$HOST"

TODO

  • Packaging

License

GPLv3 or newer