Create the Login App for LastPass, then capture both the Application ID and OpenID Connect metadata document values and then configure the API permissions for the app.
About this task: The steps below are performed in the Azure AD portal.
Create the Login App for LastPass.
- In the Azure AD portal, navigate to your home directory at https://portal.azure.com/#home.
- Select .
- Enter a name for your Login App (e.g., LastPass Login App).
- Select the radio button for the Accounts in this organizational directory only setting.
- Click Register.
Now that you have created the Login App, capture the values needed for the LastPass Admin Console later.
- Copy the Application (client) ID by doing the following:
- With Overview selected in the left navigation, click Essentials to expand the section below.
- Copy the Application (client) ID and paste it into your text editor.
Remember: You will be using this value in later steps.
- Copy the OpenID Connect metadata document by doing the following:
- With Overview still selected in the left navigation, select Endpoints to expand the menu on the right.
- Copy the OpenID Connect metadata document and paste it into your text editor.
- Close the menu in the right navigation.
Remember: You will be using this value in later steps.
Configure authentication in the Login App for LastPass.
- Select Authentication in the left navigation.
- Click Add a platform.
- Select Web.
- In the "Redirect URIs" section, enter:
https://lastpass.com/passwordreset.php
If your account is in the EU, also enter
https://lastpass.eu/passwordreset.php
- In the "Implicit grant" section, enable both of the following settings:
- Click Configure.
- Within the "Web" section under Redirect URIs, select Add URI.
- Enter the second Redirect URI as follows:
https://accounts.lastpass.com/federated/oidcredirect.html
- Click Save.
Configure API permissions for the Login App for LastPass.
- Select API permissions in the left navigation.
- Click Add a permission, then select Microsoft Graph.
- In the right menu, select Delegated permissions.
- Under Select permissions, check the boxes to enable the following permission names:
Permission Type |
Permission Name |
OpenId permissions |
|
User |
|
- Click Add permissions.
- Click Grant admin consent for <your company name>.
- Click Yes to confirm.
Enable requiring assignment.
- Navigate back to the Home directory at https://portal.azure.com/#home.
- Select Enterprise applications.
- Select LastPass Login App.
- Select Properties.
- Set the Assignment required property to Yes.
- Select Save.
Optional: Configure the Login App to allow federated login via the mobile app when conditional access policies are enforced.
- Navigate back to the Home directory at https://portal.azure.com/#home.
Note: If your Azure AD environment does not have conditional access policies enforced, skip the instructions below and proceed to the Step #4 article because additional configuration is not needed.
- Select App registrations.
- Select the Login App for LastPass.
- Select Authentication in the left navigation.
- Select Add a platform.
- Complete the setup for your desired platform(s):
Platform |
Instructions |
iOS/macOS |
- Select iOS/macOS.
- For the bundle ID value, enter:
com.lastpass.ilastpass
- Select Configure.
- The redirect URI should be the following:
msauth.com.lastpass.ilastpass://auth
|
Android |
- Select Android.
- For the package name value, enter:
com.lastpass.lpandroid
- For the signature hash value, enter:
Nj4J6bdFV874uA0vAgoHGeD4ip0=
|
- Select Save when finished.
Important: You must also complete Step #5 (in the next article) in order to enable support for federated login via mobile with conditional access policies enforced.
Results: You have created and configured the Login App for LastPass (including API permissions), as well as captured both the Application ID and OpenID Connect values for later use.