Okta App Integration

Set up an app integration so that your user can sign into this app using the same credentials that they use for LastPass.

Part 1 - Add the SSO app to LastPass

LastPass offers SAML-based integration with Okta where LastPass serves as an identity provider and manages user identity information. Users Log into Okta leveraging LastPass MFA, and they will be redirected to the Okta SSO portal. Users will open their applications right from Okta SSO without an additional login step. Alternatively, users can directly log into an application or service provider website using LastPass MFA.

  1. Log in and access the LastPass Password Manager Admin Console by doing either of the following:
    • While logged in to LastPass, click the active LastPass icon in your web browser toolbar, then select Admin Console in the menu.
    • Log in at!/dashboard with your admin username and Master Password.
  2. Go to Applications > SSO apps.
  3. If you have not previously added SSO apps, click Add your first SSO app. Otherwise, click Add app in the upper-right navigation.
  4. In the Search field, under the Select app section, search for your app in the catalog.

    Note: If you cannot find your app click Add an unlisted app.

  5. Click Continue.
  6. Go to this app’s settings to enable single sign-on. Make sure your app recognizes LastPass as the Identity Provider. Some apps allow you to upload settings in an XML file, while others require you to copy and paste the information below.

    Entity ID
    SSO endpoint
    Logout URL
    Default is selected, or select another
    Certificate fingerprint
    Certificate fingerprint (SHA256)

  7. Optional: If needed, you can click the Download icon to download and save the LastPass Certificate (TXT) and/or Metadata (XML) files.
  8. Open a new web browser window or tab to proceed with the next steps.

Part 2 - App Configuration

  1. Log into Okta Admin Portal, from the top menu, click on Security.
  2. Click on Identity Provider.

    NoPassword Okta Integration Identity Provider

  3. Click on Add Identity Provider button. NoPassword Okta Integration Add Identity Provider

  4. Add Identity Provider window will appear, enter LastPass in the name section.

    NoPassword Okta Integration Add Provider

  5. In the Authentication settings section, click on IdP Username and choose the 1st option: IDP user.subjectNameid.
  6. Expand the SAML Protocol Setting section, upload the LastPass Certificate that you downloaded.
  7. Paste Entity ID You copied from LastPass dashboard to IdP Issuer URI and paste SSO End Point copied from LastPass to IdP Single Sign-On UPL.


  8. Click on Show Advanced Settings.
  9. Uncheck Sign SAML Authentication Requests in Request Signature option.
  10. In Response Signature Algorithm section, choose SHA-1 and click on Add Identity Provider to save the settings.


  11. Copy Assertion Consumer Service URL and Audience URIfor the next step.

    Okta SAML Integration

Part 3 - Finalize the Okta SSO App Configuration

  1. Return to the LastPass Admin Console.
  2. On the LastPass Admin Console web browser window or tab you left open as the last step in Part 1, locate Set up LastPass.
  3. Under Service Provider, paste the Assertation Consumer Service URL copied from Okta portal to the ACS field and paste Audience URI copied from Okta portal to Entity ID.
  4. Optional: Advanced settings, add any of the following additional customizations:

    Entity ID
    The name of the app how it appears in the Admin Console (and Cloud Apps, if your users have a LastPass password management Vault).
    (also known as the Issuer ID or App ID for your app) – This is the Metadata URL of the Service Provider.
    Learn how to create roles
    Identity Provider
    Relay State
    URL to which the service provider redirects the user after processing the SAML response.
    Choose from Email, Secondary Email, User ID, Groups, Roles, or CustomID. By default, Email is selected. Depends on the configured app, check its support site.
    SAML Signature Method (optional)
    Check the box for using SHA1 and/or SHA256.
    Signing and encryption
    Check the box for using
    • Sign assertion
    • Encrypt assertion
    • Sign request
    • Sign response

  5. Optional: Click Upload partner certificate to upload a Partner Certificate.

    You can define custom attribute statements when creating a new SAML integration, or modifying an existing one. These statements are inserted into the SAML assertions shared with your app.

  6. Optional: To add more custom attributes, click Add SAML attribute, then use the drop-down menu to make your selections.
  7. During the app setup, you can click Save & assign users to begin selecting users to assign.
  8. To assign new users, click Assign users, groups & roles in the Users, groups & roles window.
    1. In the Assign users, groups & roles window select specific Users, Groups or Roles to assign.
    2. When selected, click Assign.
    3. Click Save & continue when finished in the Users, groups & roles window.
  9. Click Finish.

    If you have already set up and saved the app, click the app in the Applications > SSO apps Applications window. In the Configure app window click Save & edit users to Unassign or assign more users, groups and roles.

    Result: Your SSO app is now configured! The LastPass users you assigned to this SSO app can now log in and access the app using their LastPass account.