Product

Okta Identity Engine

Objective

To configure LastPass Authenticator as IdP MFA.

Details

Create a custom SSO App in LastPass

  1. Login into LastPass Admin console: https://admin.lastpass.com
  2. Go to Applications > SSO Apps
  3. Add App

  1. In order to create a custom SSO App, we need to generate Keys which will take 15 mts to get activated after which the SSO Apps are available.

  1. Create custom service for Okta

  1. Scroll down to find the Single sign-on URL and Identity provider entity ID. This needs to be provided to Okta.

  1. Scroll down to the certificate for Service Provider

  1. Copy certificate into a text file and rename to .cer (Ex: LastPass.cer)
  2. Upload this certificate into OKTA

Configure LastPass as a SAML2.0 IdP in Okta

  1. Login to Okta and go to Security > Identity Providers
  2. Add a new Identity Provider

  1. Select a SAML 2.0 IdP and click Next

  1. Provide a name and select Factor Only in IdP Usage

 

  1. Enter IdP Issuer URL (Identity provider entity ID) and Single Sign On URL from LastPass

  1. Upload the certificate that was copied from LastPass SSO App configuration

  1. Save the IdP

  1. Copy the Assertion Consumer Service URL (ACS) URL, Audience URI and download metadata

Update Okta SSO App Configuration in LastPass

  1. In LastPass Admin Console, Edit Custom Service that was created under SSO Apps
  2. Update the Service Provider entity ID with IdP ID and Assertion Consumer Service with ACS URL from OKTA Identity provider screen

  1. Import SAML SP Metadata

Copy and paste the metadata from OKTA

  1. Export SAML IdP Metadata

  1. Download the metadata
  2. Save the configuration in LastPass

Add Okta SAML 2.0 IdP Authenticator

  1. Login to Okta and go to Security > Authenticators

  1. Add authenticator

  1. Provide name for the authenticator

Select LastPass Authenticator that we created in earlier step

Name: LastPass Authenticator

Use Default Logo

  1. LastPass Authenticator was added

User Experience

  1. Create an enrollment policy to allow users to enroll into LastPass Authenticator

 

  1. An authentication policy must be created to prompt the user for MFA as LastPass Authenticator. For Ex:

  1. User logs into LastPass with LastPass account

After successfully logged in, user is logged into Okta

Configure LastPass Password Less Login

When user is redirected to LastPass, user is not prompted for password but allows login using user name and LastPass authenticator

Enable Allow passwordless login policy

  1. As a LastPass Administrator, login to Admin Console, go to Policies>General Policies
  2. Search for Allow passwordless login

Disable any MFA policies

If any MFA policies are configured, then disable all MFA policies in LastPass

Enable Passwordless login (User setting)

  1. Login to LastPass as a regular user, Go to Account Settings and Enable Passwordless login in Passwordless login options

  1. Passwordless login is enabled for each browser where LastPass is accessed (we will need different policies for different browsers)

  1. Logout

User Experience

Provide OKTA username and password (If Desktop SSO is configured, then when user accesses OKTA will be asked to verify with LastPass that will need user to enter the LastPass Username and accept the LastPass Authenticator login request on his/her mobile)

Verify with LastPass Authenticator

A push notification is sent on user’s device

User is logged into Okta after successful login to LastPass (user is not prompted for password)

High Level Steps to achieve LastPass as MFA

OKTA configurationLastPass Admin configurationLastPass User configuration

Add a SAML 2.0 IdP (Security > Identity Providers) for LastPass

· Configure the SAML 2.0 Identity Provider in OKTA as Factor Only

 

 

Add a new SSO Application in LastPass for OKTA

· IdP issuer URL (LastPass IdP ID), SSO URL and a Certificate (Public Key) are created as part of this process

 

Update Identity Provider with information from LastPass.

· Once we save the IdP, OKTA presents with Identity Provider ID, Metadata, and Assertion Consumer Service (ACS) URL

  
 

Update the IdP ID as Service provider ID, update the ACS link and import the metadata into LastPass SSO App. Save the application

 

 
 Disable all MFA factors except LastPass Authenticator 
 Enable the General policy Allow passwordless login (optionally restrict to specific users) 
 If there are any MFA policies, they have to be disabled 
  Enable Passwordless options in Account Settings
  If there are any MFA policies, they have to be disabled
Add the Identity Provider as an Authenticator (Security >Authenticators)  

Add a Factor Enrollment Policy for the users to allow users to setup LastPass Authenticator as their preferred MFA (this can be made a Required MFA factor along with Password)

 

  
Add an Authentication policy for OKTA Dashboard to use a custom authentication chain having Password and LastPass IdP Authenticator. Additional restrictions on user group membership, devices allowed, user IPs allowed, MFA challenge period can be configured  

 

Result: User when accesses OKTA, is prompted for username and password followed by LastPass Verification. User needs to provide the LastPass Username and then accept the LastPass Authenticator’s login request on his/her mobile.

Reference(s)

Okta documentation to configure IdP Authenticator

Configure the IdP authenticator | Okta Identity Engine

Add a SAML 2.0 IdP | Okta Identity Engine

LastPass instructions to enable password less login

About passwordless login for LastPass

Author

Rajya Tupuri

 

TOP