- Created a new group
DOMAIN\LapsAdmins
. Currently empty. - Configured GPO
Configure Authorized password decryptors
to point to my groupDOMAIN\LapsAdmins
- Forced
server1
to create a new encrypted password for the local Administrator account Get-LapsADPassword server1 -AsPlainText -IncludeHistory
As expected, my user DOMAIN\dtrevor
cannot decrypt the password.
- Added
DOMAIN\dtrevor
to groupDOMAIN\LapsAdmins
- Logoff and logon with user
DOMAIN\dtrevor
Get-LapsADPassword server1 -AsPlainText -IncludeHistory
As expected, my user DOMAIN\dtrevor
can decrypt and view all passwords, both the current password and the whole password history
- Removed
DOMAIN\dtrevor
from groupDOMAIN\LapsAdmins
- Logoff and logon with user
DOMAIN\dtrevor
- Ran
gpupdate /force
onserver1
- Forced
server1
to create a new encrypted password for the local Administrator account Get-LapsADPassword server1 -AsPlainText -IncludeHistory
Unexpectedly, my user DOMAIN\dtrevor
can still decrypt and view all passwords, including the freshly generated one and also including the whole password history. Why?
This question was answered by Jay Simmons of Microsoft in the official blog post about the new LAPS. The answer is in the comment section on page 7.
The behavior mentioned in the question is due to the caching mechanism of DPAPI.
This means that as long as the cached key persists on the local machine, the user may decrypt old passwords still. In practice, this does not seem like a big deal because when you want to revoke access you would also remove the ACL from the AD fields, so the user cannot access the encrypted value in the first place.