Create the Login App for LastPass, then capture both the Application ID and OpenID Connect metadata document values and then configure the API permissions for the app.
About this task: The steps below are performed in the PingOne admin portal.
Create LastPass K1 User Attribute.
- In the PingOne portal, navigate to your home directory.
- Select your Environment, then select .
- Click Add Attribute.
- Select Declared in the Select Attribute Type window, then click Next.
- In the Set Attribute Properties window, enter the following information:
- Name: Enter LastPassK1.
- Display Name: Enter LastPassK1.
- Description: Enter any description or leave it empty.
- Uncheck both of the Enforce Unique Values and Allow Multiple Values settings.
- Click Save and Close.
- Under User Attributes search for the LastPassK1 attribute to make sure that it is enabled.
Create Resource Profile.
- Select
- Click
Add Resource to create a Resource Profile.
- Enter the following information in the Create Resource Profile tab:
- Resource Name: Enter LastPass.
- Audience: Enter LastPass.
- Description: Enter any description or leave it empty.
- Click Save and Continue.
- On the Configure Scopes tab, select .
- Enter lastpass as the Scope Name, and enter your desired information into the Description field.
- Click Next.
- View the Resource Summary on the Confirm and Publish tab, then click Publish and Save.
- In the Resources window, select
next to the newly created LastPass resource, then click the
to edit it.
- Select the Access Token tab.
- Click + Add Attribute and select PingOne Attribute:
- Set the PingOne User Attribute to LastPassK1.
- Enter LastPassK1 to the User Attribute field.
- Click Save.
Note: This is the user attribute you created in Step #5 above.

Create the Login App for LastPass.
- Select in the left navigation.
- Click
to create a new application.
- Enter a name and description for your Application (for example, LastPass Login App).
Note: You can use the image below to upload as the App logo:
- Select OIDC Web App, then click Save.
Prepare to configure the PingOne Login App with the LastPass Admin Console.
- Select the Configuration tab, then select
.
- Configure the following settings:
- Response type: Enable the Code setting only.
- Grant type: Enable the Authorization Code setting.
- PKCE Enforcement: Select Required in the drop-down menu.
- Leave the Implicit, Client Credentials and Refresh token settings unchecked.
- In the "Redirect URLs" section, enter the following redirect URIs:
- Token Endpoint Authentication Method: Select None.
- Leave the Initiate Login URI, Target Link URI, Allow unsigned JWT requests empty and unchecked.

- Click Save.
- Select the Resources tab, then select
to edit the Scope Grants:
- p1:update:user (PingOne API)
- lastpass (LastPass)
- email (openID)
- Click Save.