SAMLv2 with Cisco Secure Desktop (CSD) XML response has no auth node
Continued discussion from https://github.com/vlaci/openconnect-sso/issues/35 with @dwmw2
I tested it and it seems only the last step is failing
XML response has no "auth" node
Here you can see what the last response looks like in openconnect-sso and it seems in this case they have a different xml structure. So maybe just another case needs to be added to check for this and get the server-cert-hash value in here: https://git.infradead.org/users/dwmw2/openconnect.git/blob/14a5998775:/auth.c#l685
<?xml version="1.0" encoding="UTF-8"?>
<config-auth client="vpn" type="complete" aggregate-auth-version="2">
<session-id>102619304</session-id>
<session-token>94B7.....5484</session-token>
<config client="vpn" type="private">
<vpn-base-config>
<base-package-uri>/CACHE/stc/1</base-package-uri>
<server-cert-hash>20151F9983E79123A55AA4F0ACF1634F8973A962</server-cert-hash>
...
</vpn-base-config>
</config>
</config-auth>
Thanks
Edited by David Woodhouse