Back to all tools
Web AppAutomation

Windows LAPS Self‑Service Portal

Windows LAPS Self-Service Portal lets users securely retrieve the LAPS password for their own device without helpdesk tickets. Built on Azure Static Web Apps + Azure Functions and Entra ID, it enforces an only-my-device rule, requires a justification, and auto-hides the password after 60 seconds. Every access is auditable in Azure Table Storage, with a zero-stored-secrets design and Graph access via a Managed Identity.

Created by

Security Analysis

5of 6
1 Issue FoundOverride

11 files scanned on Mar 12, 2026

Issues Detected
No Hardcoded Secrets
No API keys or credentials in code
Hardcoded credential in infra/deploy.sh ([lines: 297, 320](https://github.com/daniel-fraubaum/laps-self-service-portal/blob/main/infra/deploy.sh#L297-L320))
Passed Checks
No Obfuscated Code
No Remote Execution
No Credential Theft
No Data Exfiltration
No Malicious Patterns
AI Analysis

The codebase adheres to secure authentication flows (Easy Auth or JWKS) and Graph API usage for Intune/Graph integration. No evidence of remote code execution, obfuscated payloads, credential harvesting, data exfiltration via external endpoints, or hardcoded production secrets in code paths. Primary concerns are inadvertent exposure of PII through telemetry/audit logs and the presence of secret placeholders in a config template that must be replaced before deployment.

Screenshots1 / 5

Swipe to see more