AWS App Integration

Set up an app integration so that your user can sign into this app using the same credentials that they use for LastPass.

Part 1 - Add the SSO app to LastPass

  1. Log in and access the LastPass Password Manager Admin Console by doing either of the following:
    • While logged in to LastPass, click the active LastPass icon in your web browser toolbar, then select Admin Console in the menu.
    • Log in at!/dashboard with your admin username and Master Password.
  2. Go to Applications > SSO apps.
  3. If you have not previously added SSO apps, click Add your first SSO app. Otherwise, click Add app in the upper-right navigation.
  4. In the Search field, under the Select app section, search for your app in the catalog.

    Note: If you cannot find your app click Add an unlisted app.

  5. Click Continue.
  6. Go to this app’s settings to enable single sign-on. Make sure your app recognizes LastPass as the Identity Provider. Some apps allow you to upload settings in an XML file, while others require you to copy and paste the information below.

    Entity ID
    SSO endpoint
    Logout URL
    Default is selected, or select another
    Certificate fingerprint
    Certificate fingerprint (SHA256)

  7. Optional: If needed, you can click the Download icon to download and save the LastPass Certificate (TXT) and/or Metadata (XML) files.
  8. Open a new web browser window or tab to proceed with the next steps.

Part 2 - App Configuration

  1. Log into Amazon Web Services Management Console as an administrator.
  2. Click on Services. Under the Security and Identity section of the console, click on Identity & Access Management.


  3. Click on Identity Providerson the left side menu, then click on Create Provider.

    AWS 2

  4. Choose SAML from the drop-down menu and click on Next Step.

  5. Enter LastPass as the Provider Name, then click on the Choose File to upload the Metadata file that you downloaded in part 1. Once uploaded, click on the Next Step button.

    AWS IdP Provider

  6. Click on the Create button, on the bottom right corner of the page.

  7. At this point, you have completed creating a SAML provider. All you need is to create a role.
  8. From the left side menu, click on Roles. If you have already created roles, select one. If you don't have any roles, click on Create Role to create one.

    AWS IAM Roles

  9. Select SAML 2.0 federation.

    AWS SAML 2.0

  10. Select LastPass as the SAML provider and check Allow programmatic and AWS Management Console access. Then click on Next Permission.

    AWS Role Setting

  11. Select one or more policies (we selected administrator access in this tutorial) and click on the Next: Tags button.

    AWS role permission

  12. First, select a Role name and click on the Create role.

  13. Click on your created role name. In the Summary section, click on the Trusted relationship tab and copy Role ARN and Trusted Entities values.

    AWS Role Summary

Part 3 - Finalize the AWS SSO App Configuration

  1. Return to the LastPass Admin Console.
  2. On the LastPass Admin Console web browser window or tab you left open as the last step in Part 1, locate Set up LastPass.
  3. Under Service Provider, paste the following URL in the ACS field:
  4. Expand the Custom Attributes section, paste the following information:

    • Attribute 1: Constant Value
    • SAML Attribute name:
    • Constant value: Role ARN copied from AWS dashboard + , + Trusted Entity copied from AWS dashboard
    • Example: arn:aws:iam::*****role/admin,arn:aws:iam::*****saml-provider/identity.lastPass

  5. Optional: Advanced settings, add any of the following additional customizations:

    Entity ID
    The name of the app how it appears in the Admin Console (and Cloud Apps, if your users have a LastPass password management Vault).
    (also known as the Issuer ID or App ID for your app) – This is the Metadata URL of the Service Provider.
    Learn how to create roles
    Identity Provider
    Relay State
    URL to which the service provider redirects the user after processing the SAML response.
    Choose from Email, Secondary Email, User ID, Groups, Roles, or CustomID. By default, Email is selected. Depends on the configured app, check its support site.
    SAML Signature Method (optional)
    Check the box for using SHA1 and/or SHA256.
    Signing and encryption
    Check the box for using
    • Sign assertion
    • Encrypt assertion
    • Sign request
    • Sign response

  6. Optional: Click Upload partner certificate to upload a Partner Certificate.

    You can define custom attribute statements when creating a new SAML integration, or modifying an existing one. These statements are inserted into the SAML assertions shared with your app.

  7. Optional: To add more custom attributes, click Add SAML attribute, then use the drop-down menu to make your selections.
  8. During the app setup, you can click Save & assign users to begin selecting users to assign.
  9. To assign new users, click Assign users, groups & roles in the Users, groups & roles window.
    1. In the Assign users, groups & roles window select specific Users, Groups or Roles to assign.
    2. When selected, click Assign.
    3. Click Save & continue when finished in the Users, groups & roles window.
  10. Click Finish.

    If you have already set up and saved the app, click the app in the Applications > SSO apps Applications window. In the Configure app window click Save & edit users to Unassign or assign more users, groups and roles.

    Result: Your SSO app is now configured! The LastPass users you assigned to this SSO app can now log in and access the app using their LastPass account.