How do I change my Okta federated integration from Implicit flow to Authorization Code flow with PKCE?
As an Okta user, a new authorization flow between LastPass and Okta is available. Okta now supports the Authorization Code flow with a Proof Key for Code Exchange (PKCE), which is currently the most secure method for controlling access between two parties. LastPass has already implemented this security update, but as an Admin, you need to adjust several items in the Okta admin portal, and through the LastPass federation configuration page in the new Admin Console, for the update to take full effect.
Step #1: Configure additional sign-in redirect URIs for your LastPass single-page application in Okta
Before you begin: Log in to your Okta Admin portal with your administrator account credentials.
Step #2: Change grant type from Implicit to Authorization Code for your LastPass single-page application in Okta
Before you begin: Log in to your Okta Admin portal with your administrator account credentials.
Step #3: Change grant type from Implicit to Authorization Code in your LastPass authorization server's access policy in Okta
About this task:
Attention: This step is relevant only for those who have an authorization server set up for their integration.
Skip this step if either of the following applies:
- You are using Okta SCIM as the Identity Provider and directory provider without an authorization server (standard configuration, without authorization server)
- You are using Okta SSO as the Identity Provider and Active Directory as the directory provider (hybrid configuration)
Before you begin: Log in to your Okta Admin portal with your administrator account credentials.