Current State
IT units on campus do not have a common method for managing the local administrator password on workstations or servers. Current methods include a single common password on all of a IT unit's workstations, password templates that are unique but reproducible, and unique passwords that are managed and change through custom scripted changes. The password may or may not be stored for lookup and retrieval. If it is stored for retrieval it may be store stored as plain text store or in a secure store. The storage is inconsistent because each IT unit will make its own decision. The password may be rendered unknown if a scripted change fails, or an administrator leaves without sharing the password. This case may render a workstation or server unmanageable by the IT staff.
Background
UW-IT customers have requested the installation of LAPS or LAPS.E to help manage the password using the NetID domain and group policy. LAPS.E extends the capability of LAPS with the ability to store the local administrator password as an encrypted string in Active Directory. LAPS is officially released and supported my Microsoft. LAPS.E is neither released by nor supported by Microsoft. LAPS.E was developed by and released by a member of the LAPS team at Microsoft. LAPS stores the local administrator password, in plain text, in a secure attribute of the machine account in Active Directory (AD) and includes a client side extension (CSE) to be installed on a workstation or server to change and store the password. A Group Policy Object (GPO) is used to configure the password settings such as length, complexity and the frequency it is changed. LAPS.E's additional capability is implement by inserting an encryption and decryption service between the CSE and the AD attributes.Description of Solution
The LAPS(.E) implementation consists of several parts.- An AD schema extension to create two new extended attributes to store the password and its expiration date.
- Configuration of AD permissions, allow domain admins and other designated administrators, such as OU admins, explicit access to the extended password attributes to computer objects in designated OUs.
- SRV record in the netid.washington.edu domain which allows the CSE to discover the PDS
- A Password Decryption Service (PDS) which is responsible for encrypting and decrypting passwords when stored and retrieved
- A set of PowerShell Cmdlets which are installed from an MSI package
- A fat client that is installed from and MSI package
- An optional website available from GitHub which allows designated administrators access to retrieve passwords
Other Solutions
An analysis of alternatives to LAPS was performed by discovering a series of password management solutions online and evaluating their suitability based on several criteria. Those criteria included:- License type - does the product have a free or commercial license?
- Scope of the product - is the product standalone or part of a management suite?
- AD considerations - does the product require a schema change? Are the passwords stored in AD or another database?
- Local agent - does the product require a local service or agent?
- Encrypted store - does the product store the passwords in encrypted form?
- Temporary elevation - does the product allow for limited elevation of privileges?
- Platform considerations - is the product cross platform?
- Auditing capabilities - does the product allow for tracking and auditing?
- Price - how much would it cost in hardware, software, design, and maintenance?