Setting up Microsoft LAPS for Active Directory

Lithnet Access Manager provides a convenient web-based interface for accessing local admin passwords generated by both the legacy Microsoft LAPS client (using the ms-mcs-AdmPwd attribute), and the new Windows LAPS client (using the msLAPS-* attributes) built into Windows.

This guide assumes that you have the Microsoft LAPS agent deployed and configured appropriately.

This guide focuses on setting up support for Microsoft LAPS passwords stored in Active Directory. See our other guide for passwords stored in Azure Active Directory.

Step 1: Delegate Microsoft LAPS password permissions

You can use the Microsoft LAPS PowerShell cmdlets to delegate password read and reset permissions to the AMS service account, or use a script generated by AMS to do this for you.

From the Directory configuration/Active Directory/Microsoft LAPS page, click on Delegate Microsoft LAPS Permissions to see a pre-built script for delegating the appropriate permissions. Simply change the $ou variable to the full DN on of the container than contains the computers you want to be able to access with AMS.

Copy this script and run it with an account that has either domain admin rights, or delegated control of the specified container.

Step 2: Assign encryption permissions (New Windows LAPS)

If you are using the new Windows LAPS along with the encrypted password functionality, then as well as delegating access to read the objects from the directory, you need to ensure the AMS service account is permitted to decrypt the passwords. Modify the Windows LAPS group policy, to ensure that the AMS service account is a member of the Authorized password decryptor group specified in the Configure authorized password decryptors setting of the Computer configuration\Administrative Templates\System\LAPS policy.

Step 3: Assign access

The final step is to create an authorization rule, granting permission for your selected users and groups to access the LAPS passwords for the specified computers.

From the Authorization rules/Computers page, select Add... to create a new rule. Select the OU you delegated permissions to, and provide a friendly description for this rule. This will appear in audit logs if a user is granted access.

Expand the Access control section and select Edit Permissions... to open the ACL editor.

Note that legacy Microsoft LAPS does not support storing of LAPS history, so granting that permission will not have any effect.

You can optionally choose to expire the local admin password a period of time after it has been accessed. This will cause the LAPS agent to generate a new password after its next check-in time. It may be up to 90 minutes after the time you specify.

If you'd like to be notified when someone accesses a LAPS password, select the notification channels you'd like to send to for success and failure events.

Last updated