HELP FILE

Trello App Integration

    Set up an app integration so that your user can sign into this app using the same credentials that they use for LastPass.

    Part 1 - Add the SSO app to LastPass

    About this task:
    1. Log in and access the LastPass new Admin Console by doing either of the following:
      • While logged in to LastPass, click the active LastPass icon active LastPass icon in your web browser toolbar, then select Admin Console in the menu.
      • Log in at https://admin.lastpass.com with your admin email address and master password.
    2. Go to Applications > SSO apps.
    3. Select Add app in the upper-right navigation (or Search the catalog if you're adding your first app).
    4. Search for and select your app from the catalog (or Add an unlisted app if you can't find your app).
    5. Click Continue, and you are taken to the Set up LastPass section of the app configuration.

      Fastpath: LastPass automatically fills out all required information in the Set up app section for you. Some apps allow you to upload settings in an XML file, while others require you to copy and paste the following information:
      Name in LastPass Value
      Entity ID
      https://identity.lastpass.com
      SSO Endpoint
      https://identity.lastpass.com/SAML/SSOService
      Logout URL
      https://identity.lastpass.com/Login/Logout
      Certificate fingerprint Provided in the Set up app section of the SSO app. If needed, download the LastPass certificate in PEM, DER, or Download metadata (XML) format.
      Certificate fingerprint (SHA256)
      Certificate (PEM)

    6. For the next steps, open a new web browser window or tab. Go to the app's settings to enable single sign-on, and make sure your app recognizes LastPass as the Identity Provider.

    Part 2 - App Configuration

    1. Log into your Atlassian admin account at https://admin.atlassian.com/.

      Note: For more information about SAML sign-on with Atlassian Access, view Atlassian Support documentation.

    2. Select Manage users.

      Atlassian Access Manage Users

    3. In the top navigation menu, select Security.

      Atlassian Access Security

    4. In the left navigation bar, select Identity providers.

      Atlassian Access Identity Providers

    5. Cick Choose in Other provider.

      Atlassian Access selecting Other provider

    6. If you do not have a directory, enter a custom directory name into the Directory name field, then select Add.

      Atlassian Access adding Identity provider

    7. Select Set up SAML single sign-on.

      Atlassian Access setting up SAML Single Sign-on

    8. Read the Before you begin section, then select Next.

      Atlassian Access Before you begin

    9. Enter the following information, then select Next:

      Name Description Value
      Identity provider Entity ID SSO endpoint value (copied from the LastPass Admin Console) https://identity.lastpass.com
      Identity provider SSO URL SSO endpoint value (copied from the LastPass Admin Console) https://identity.lastpass.com/SAML/SSOService
      x.509 Certificate LastPass certificate file you downloaded in Part 1 Paste the LastPass Certificate that you downloaded in Part 1
      Atlassian Access Add SAML details

    10. Copy the Service provider entity URL and the Service provider assertion consumer service URL and paste them into a text editor, then select Next.

      Remember: You will be using these values in later steps.
      Atlassian Access Copy URLs

    11. Link a domain to your directory, then select Next.

      Atlassian Access Link Domain to Identiry Provider Directory

    12. Select Stop and Save SAML.You can set up user provisioning later.

      Atlassian Access Stop and Save SAML

    Part 3 - Finalize the Trello SSO App Configuration

    1. Return to the LastPass new Admin Console.
    2. Back on the Configure app page in the LastPass Admin Console (from Part 1), select Set up LastPass.
    3. LastPass needs to know the app’s URI to the Assertion Consumer Service (ACS) to be able to authenticate users. This is provided by your SSO app.

      ACS
      The URL to which LastPass sends authentication assertions after authenticating a user. It may also be known as Post-Back URL, Reply URL, Single Sign-On URL, or Service Provider URL.
      Step-up authentication (passwordless login)
      Enable this setting if you want to require users to confirm their identity using the LastPass Authenticator app upon each login to this SSO app.
      Remember: Passwordless login for SSO apps only supports authentication using stored biometrics (face or fingerprint) via push notification in the LastPass Authenticator app.

    4. Select Advanced settings.
    5. For the Entity ID field, paste the Service provider entity URL copied in Part 2.
    6. Optional: If desired, in the Advanced settings section, add any of the following additional customizations:

      Name in LastPass Description/Value
      Nickname The name of the app how it appears in the Admin Console (and Cloud Apps, if your users have a LastPass password management vault)
      Role Custom role that you created to organize users and the permissions assigned to them
      Identity Provider (LastPass) This is the URL of the identity provider, which is LastPass:
      https://identity.lastpass.com
      Relay State URL to which the service provider redirects the user after processing the SAML response
      Identifier These settings will depend on the app you're configuring – please refer to the SSO app's documentation, then select one of the following:
      • Email (default)
      • Secondary Email
      • User ID
      • Groups
      • Roles
      • Custom
      SAML signature method SHA256 (uses 256-bit hash)
      Signing and encryption Make your desired selections from the following:
      • Sign assertion
      • Encrypt assertion
      • Sign request
      • Sign response
      Upload partner certificate Select the partner certificate you saved locally (if applicable)
      Custom attributes To add more custom attributes, select Add SAML attribute and choose from the following options:
      • Email
      • Secondary Email
      • User ID
      • Groups
      • Roles
      • Custom (associated with the SSO app)
      Tip: You can define custom attribute statements when creating a new SAML integration, or modifying an existing one. These statements are inserted into the SAML assertions shared with your app.

    7. Click Save & assign users > Users, groups & roles to begin making your selections.
    8. Search for and select your desired users, groups, and/or roles, then click Assign.
    9. Click Save & continue > Finish.

      Result: Setup for your SSO app is complete! The LastPass users you assigned to this SSO app can now use their LastPass account to sign in to this SSO app going forward.