--- title: LAPS DDF file description: Learn about the OMA DM device description framework (DDF) for the Local Administrator Password Solution configuration service provider. ms.author: jsimmons ms.topic: article ms.prod: w11 ms.technology: windows author: jsimmons ms.localizationpriority: medium ms.date: 07/04/2022 ms.reviewer: jsimmons manager: jsimmons --- # Local Administrator Password Solution DDF file This article shows the OMA DM device description framework (DDF) for the Local Administrator Password Solution (LAPS) configuration service provider. Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). The XML below is the current version for this CSP. ```xml 1.2 "%windir%\system32\LapsCSP.dll {298a6f17-03e7-4bd4-971c-544f359527b7} LAPS ./Device/Vendor/MSFT The root node for the LAPS configuration service provider. 99.9.99999 1.0 Policies Root node for LAPS policies. Policies BackupDirectory 0 Use this setting to configure which directory the local admin account password is backed up to. The allowable settings are: 0=Disabled (password will not be backed up) 1=Backup the password to Azure AD only 2=Backup the password to Active Directory only If not specified, this setting will default to 0. text/plain 0 Disabled (password will not be backed up) 1 Backup the password to Azure AD only 2 Backup the password to Active Directory only PasswordAgeDays 30 Use this policy to configure the maximum password age of the managed local administrator account. If not specified, this setting will default to 30 days This setting has a minimum allowed value of 1 day when backing the password to onpremises Active Directory, and 7 days when backing the password to Azure AD. This setting has a maximum allowed value of 365 days. text/plain [1-365] [7-365] Vendor/MSFT/LAPS/Policies/BackupDirectory 1 BackupDirectory configured to Azure AD PasswordComplexity 4 Use this setting to configure password complexity of the managed local administrator account. The allowable settings are: 1=Large letters 2=Large letters + small letters 3=Large letters + small letters + numbers 4=Large letters + small letters + numbers + special characters If not specified, this setting will default to 4. text/plain 1 Large letters 2 Large letters + small letters 3 Large letters + small letters + numbers 4 Large letters + small letters + numbers + special characters PasswordLength 14 Use this setting to configure the length of the password of the managed local administrator account. If not specified, this setting will default to 14 characters. This setting has a minimum allowed value of 8 characters. This setting has a maximum allowed value of 64 characters. text/plain [8-64] AdministratorAccountName Use this setting to configure the name of the managed local administrator account. If not specified, the default built-in local administrator account will be located by well-known SID (even if renamed). If specified, the specified account's password will be managed. Note: if a custom managed local administrator account name is specified in this setting, that account must be created via other means. Specifying a name in this setting will not cause the account to be created. text/plain PasswordExpirationProtectionEnabled True Use this setting to configure additional enforcement of maximum password age for the managed local administrator account. When this setting is enabled, planned password expiration that would result in a password age greater than that dictated by "PasswordAgeDays" policy is NOT allowed. When such expiration is detected, the password is changed immediately and the new password expiration date is set according to policy. If not specified, this setting defaults to True. text/plain false Allow configured password expiriration timestamp to exceed maximum password age true Do not allow configured password expiriration timestamp to exceed maximum password age Vendor/MSFT/LAPS/Policies/BackupDirectory 2 BackupDirectory configured to Active Directory ADPasswordEncryptionEnabled False Use this setting to configure whether the password is encrypted before being stored in Active Directory. This setting is ignored if the password is currently being stored in Azure. This setting is only honored when the Active Directory domain is at Windows Server 2016 Domain Functional Level or higher. If this setting is enabled, and the Active Directory domain meets the DFL prerequisite, the password will be encrypted before before being stored in Active Directory. If this setting is disabled, or the Active Directory domain does not meet the DFL prerequisite, the password will be stored as clear-text in Active Directory. If not specified, this setting defaults to False. text/plain false Store the password in clear-text form in Active Directory true Store the password in encrypted form in Active Directory Vendor/MSFT/LAPS/Policies/BackupDirectory 2 BackupDirectory configured to Active Directory ADPasswordEncryptionPrincipal Use this setting to configure the name or SID of a user or group that can decrypt the password stored in Active Directory. This setting is ignored if the password is currently being stored in Azure. If not specified, the password will be decryptable by the Domain Admins group in the device's domain. If specified, the specified user or group will be able to decrypt the password stored in Active Directory. If the specified user or group account is invalid the device will fallback to using the Domain Admins group in the device's domain. text/plain Vendor/MSFT/LAPS/Policies/BackupDirectory 2 BackupDirectory configured to Active Directory ADEncryptedPasswordHistorySize 0 Use this setting to configure how many previous encrypted passwords will be remembered in Active Directory. If not specified, this setting will default to 0 passwords (disabled). This setting has a minimum allowed value of 0 passwords. This setting has a maximum allowed value of 12 passwords. text/plain [0-12] Vendor/MSFT/LAPS/Policies/BackupDirectory 2 BackupDirectory configured to Active Directory PostAuthenticationResetDelay 24 Use this setting to specify the amount of time (in hours) to wait after an authentication before executing the specified post-authentication actions. If not specified, this setting will default to 24 hours. This setting has a minimum allowed value of 0 hours (this disables all post-authentication actions). This setting has a maximum allowed value of 24 hours. text/plain [0-24] PostAuthenticationActions 3 Use this setting to specify the actions to take upon expiration of the configured grace period. If not specified, this setting will default to 3 (Reset the password and logoff the managed account). text/plain 1 Reset password: upon expiry of the grace period, the managed account password will be reset. 3 Reset the password and logoff the managed account: upon expiry of the grace period, the managed account password will be reset and any interactive logon sessions using the managed account will terminated. 5 Reset the password and reboot: upon expiry of the grace period, the managed account password will be reset and the managed device will be immediately rebooted. Actions Actions ResetPassword Use this setting to tell the CSP to immediately generate and store a new password for the managed local administrator account. text/plain ResetPasswordStatus 0 Use this setting to query the status of the last submitted ResetPassword execute action. ResetPasswordStatus text/plain ``` ## Related articles [LAPS configuration service provider](laps-csp.md)