Step #6: Apply access control policy changes in LastPass
The LastPass Custom Attribute Store installed “LastPass Trust” Relying Party Trust on your AD FS server(s).
Results:
You have successfully set up Active Directory Federation Services (AD FS) for your LastPass Business account. All of your newly populated federated users will receive a Welcome email informing them that they can now log in and use LastPass.
What to do next:
- To see your end user's experience, please see Federated login experience for LastPass Business users.
- For additional help with troubleshooting, please see Troubleshooting federated login for Active Directory Federation Services (AD FS).
- To provision non-federated users with a federated account, please see How do I convert an existing LastPass user to a federated (AD FS or PingFederate) user?
- To learn how to migrate from using AD FS to a cloud-based federated login (Okta or Azure AD), please see How do I migrate from using AD FS or PingFederate to a cloud-based federated login identity provider for LastPass?
Parent article:
Set up federated login for LastPass using AD FS
Previous article:
Step #5: Register your custom attribute with LastPass