Blog Clark Grassano — Portfolio
← Back to Blog

Why I Built LAPSr

The Problem

It was a Tuesday afternoon, and I was on-site at a client when a workstation locked up mid-session. The local admin password had rotated via LAPS. Standard situation. Except I'd left my laptop in the car, and all I had was my phone.

What followed was a four-step ordeal: open the VPN app, authenticate, navigate to the Intune admin center in a mobile browser (which is painful), find the device, click three times to surface the LAPS password, copy it, switch back to the remote session tool, paste it.

Four steps. On a phone. While standing in front of a user who was watching.

The Build

LAPSr started as a weekend project. I wanted two things: authenticate once with my Microsoft account, and get the LAPS password in two taps.

The authentication is handled by MSAL (Microsoft Authentication Library). The app requests the minimum permissions needed — DeviceManagementManagedDevices.Read.All — and nothing more.

The device list is cached locally so you can browse offline and search without a network call on every keystroke. Password retrieval always hits the Graph API live, since you don't want a stale password.

What I Learned

Building for the Microsoft ecosystem is both easier and harder than I expected. The Graph API is genuinely good once you get past the documentation. MSAL handles the OAuth dance cleanly. The hard part was the Intune device schema — it's inconsistent across device types in ways that took a while to smooth over.

The other thing I learned: IT admins are a loyal user base when you solve a real problem. The first beta had 40 testers within 48 hours, sourced entirely from a Reddit post in r/sysadmin.

What's Next

LAPS v2 (Windows LAPS) support is coming. The schema is different from legacy LAPS and requires a different Graph endpoint. I'm also looking at adding a quick-copy widget for iOS so you can get the password without even opening the app.

If you manage Microsoft environments and want to try it, reach out.