Step #4: Configure Federated Login Settings for PingOne in LastPass
Enter the Application (client) ID and OpenID Connect metadata document from PingOne in to the LastPass Admin Console.
About this task: These steps below are performed in the LastPass Admin Console.
Note: After performing the instructions below, all of your newly populated federated users will receive a Welcome email informing them that they can now log in to use LastPass.
-
- Return to the LastPass Admin Console, then select .
- Select the PingOne tab, then enter the following values:
- OpenID Connect metadata document (copied from Prepare to configure the PingOne Login App with the LastPass Admin Console in Step #3: Configure the Login App for LastPass in PingOne).
- Application (client) ID (copied from Prepare to configure the PingOne Login App with the LastPass Admin Console in Step #3: Configure the Login App for LastPass in PingOne).
- Check the box for the Enabled setting.
- Click Save Changes.
- Log in to your PingOne portal with your administrator account credentials.
- Select .
- In the Connections tab, select the LastPass Provisioning App.
- Enable the provisioning app with the slider.
- In the Rules tab, select LastPass Rule.
- Enable the rule with the slider.
Enable the LastPass Provisioning App in PingOne.
Enable the LastPass Rule in PingOne.
Results:
The setup is complete! You have successfully set up your
LastPass Business account to use federated login with PingOne.
All of your newly populated federated users will receive a Welcome email informing them that they can now log in to use LastPass. Please note that your LastPass users must log in using the LastPass browser extension in order to use federated login for their PingOne account with LastPass.
Parent article:
Set Up Federated Login for LastPass using PingOne
Previous article:
Step #3: Configure the Login App for LastPass in PingOne