Office 365 App Integration

    Set up an Office 365 app integration so that your users can sign into this app using the same credentials that they use for LastPass.

    Notice: Alternatively, LastPass MFA can be used for secure login to Office 365/Azure AD SSO while maintaining Azure AD as the primary Identity Provider. For more info, visit How do I configure my Azure AD account to use LastPass MFA for authentication?

    Part 1 - Add the SSO app to LastPass

    1. Log in and access the LastPass new Admin Console by doing either of the following:
      • While logged in to LastPass, click the active LastPass icon active LastPass icon in your web browser toolbar, then select Admin Console in the menu.
      • Log in at with your admin email address and master password.
    2. Go to Applications > SSO apps.
    3. Select Add app in the upper-right navigation (or Add your first SSO app if you're adding your first app).
    4. Search for and select your app from the catalog (or Add an unlisted app if you can't find your app).
    5. Click Continue, and you are taken to the Set up LastPass section of the app configuration.

      Fastpath: LastPass automatically fills out all required information in the Set up app section for you. Some apps allow you to upload settings in an XML file, while others require you to copy and paste the following information:
      Name in LastPass Value
      Entity ID
      SSO Endpoint
      Logout URL
      Certificate fingerprint Provided in the Set up app section of the SSO app. If needed, download the LastPass certificate in PEM, DER, or Download metadata (XML) format.
      Certificate fingerprint (SHA256)
      Certificate (PEM)

    6. For the next steps, open a new web browser window or tab. Go to the app's settings to enable single sign-on, and make sure your app recognizes LastPass as the Identity Provider.

    Part 2 - Configure the app in Office 365

    Before you begin: Be sure you have set up and verified a domain before proceeding with the steps below.
    For detailed instructions, please see Microsoft Office 365 documentation.
    1. Log in to the Microsoft 365 admin center at
    2. Select Settings > Domains in the left navigation.
    3. Confirm that you have a verified domain listed.

      CAUTION: DO NOT add any users at this stage.

      Verify domain ownership in Office365

    4. In the section where you are asked How do you want to use Office 365?, disable the checkboxes next to Exchange Online and Lync Online unless DNS entries are to be updated.

      CAUTION: Before proceeding, make sure that the domain you will use is not the default domain. Instead, configure the entry as the default domain.

    5. Note: SSO configuration for Office 365 requires Windows Azure Active Directory Module for Windows PowerShell cmdlets. Download and install cmdlets at

      Cmdlet in Office365

    6. Use the PowerShell Command template and the certificate that you downloaded from the LastPass Admin Console for the next steps.

    Part 3 - Finalize the Office 365 SSO app configuration in LastPass

    1. To configure Office 365 SSO, customize the PowerShell command template as follows:

      • $domain – Enter your company domain in the following format:
      • $issuer – Enter your company domain at the end of the URL, in the following format:
      • $certificateFile – Full path and filename of the LastPass certificate file you've just downloaded

      Configure Office 365 command window

    2. Open Powershell as an administrator. Run the following command:


      Result: You are prompted for administrator credentials.

    3. Enter your administrator login credentials into the dialog that appears on the screen.
    4. Copy and paste the second command to get authenticated on Office 365:

      Connect-MsolService -Credential $cred

    5. Copy the block of PowerShell commands starting with $domain and ending with $logoffurl. Paste them into your PowerShell window.

      Powershell commands in Office365

    6. Copy and paste the second block to upload the certificate file.

      Powershell commands with certificate in Office365

    7. Run the following command to enable SSO for your domain:

      Set-MsolDomainAuthentication -FederationBrandName $domain -DomainName $domain -Authentication federated PreferredAuthenticationProtocol SAMLP -IssuerUri $issuer -Signing Certificate $certificate -PassiveLogOnUri $ssoUrl -ActiveLogOnUri $ecpUrl -LogOffUri $logoffUrl -Verbose

      Powershell command enable SSO in Office365

      Result: You have completed the manual SSO setup for Office 365.

    8. Return to the LastPass new Admin Console.
    9. Back on the Configure app page in the LastPass Admin Console (from Part 1), locate Set up LastPass.
    10. LastPass needs to know the app’s URI to the Assertion Consumer Service (ACS) to be able to authenticate users. This is provided by your SSO app.

      The URL to which LastPass sends authentication assertions after authenticating a user. It may also be known as Post-Back URL, Reply URL, Single Sign-On URL, or Service Provider URL.
      Step-up authentication
      Enable this setting if you want to force users to confirm their identity using the LastPass Authenticator app upon each login to this SSO app (i.e., LastPass MFA).

    11. Optional: If desired, select Advanced settings to add any of the following additional customizations:

      Name in LastPass Description/Value
      Entity ID This is the Metadata URL of the Service Provider (also known as the Issuer ID or App ID for your app)
      Nickname The name of the app how it appears in the Admin Console (and Cloud Apps, if your users have a LastPass password management vault)
      Role Custom role that you created to organize users and the permissions assigned to them
      Identity Provider (LastPass) This is the URL of the identity provider, which is LastPass:
      Relay State URL to which the service provider redirects the user after processing the SAML response
      Identifier These settings will depend on the app you're configuring – please refer to the SSO app's documentation, then select one of the following:
      • Email (default)
      • Secondary Email
      • User ID
      • Groups
      • Roles
      • Custom
      SAML signature method Select one of the following, based on your desired encryption key length:
      • SHA1 (uses 160-bit hash)
      • SHA256 (uses 256-bit hash)
      Signing and encryption Make your desired selections from the following:
      • Sign assertion
      • Encrypt assertion
      • Sign request
      • Sign response
      Upload partner certificate Select the partner certificate you saved locally (if applicable)
      Custom attributes To add more custom attributes, select Add SAML attribute and choose from the following options:
      • Email
      • Secondary Email
      • User ID
      • Groups
      • Roles
      • Custom (associated with the SSO app)
      Tip: You can define custom attribute statements when creating a new SAML integration, or modifying an existing one. These statements are inserted into the SAML assertions shared with your app.

    12. Click Save & assign users > Users, groups & roles to begin making your selections.
    13. Search for and select your desired users, groups, and/or roles, then click Assign.
    14. Click Save & continue > Finish.

      Result: Setup for your SSO app is complete! The LastPass users you assigned to this SSO app can now use their LastPass account to sign in to this SSO app going forward.