Solutions
Device management
Remotely manage, and protect laptops and mobile devices.
Orchestration
Automate tasks across devices, from app installs to scripts.
Software management
Inventory, patch, and manage installed software.
Infrastructure as code
See every change, undo any error, repeat every success.
Extend Fleet
Integrate your favorite tools with Fleet.
More
Device management
Remotely manage, and protect laptops and mobile devices.
Orchestration
Automate tasks across devices, from app installs to scripts.
Software management
Inventory, patch, and manage installed software.
Infrastructure as code
See every change, undo any error, repeat every success.
Extend Fleet
Integrate your favorite tools with Fleet.
Josh Roskos
Josh Roskos
Managing local administrator passwords is one of those things everyone knows matters but few want to deal with. Static passwords get shared across teams, written on sticky notes, or worse—used on multiple machines. That's a security nightmare waiting to happen.
The good news? With Fleet and 1Password Connect, you can automate the entire process. Think of it as setting up password rotation once and forgetting about it—except IT can still grab credentials when needed.
The problem: Local admin accounts on macOS and Windows typically use passwords that never change. When someone leaves the team or a device is compromised, you're stuck manually resetting passwords across hundreds (or thousands) of machines.
The solution: This LAPS implementation automatically rotates local administrator passwords every 7 days and stores them securely in 1Password. Fleet handles the automation, and 1Password keeps everything locked down until an authorized admin needs access.
Fleet policies monitor your devices and check whether the local admin password was rotated in the last week. When a host fails the check, Fleet automatically runs a script that:
The password never touches plaintext outside the 1Password Connect server until the script applies it directly to the local account.
First, set up a 1Password Connect server following the official guide. You'll need three pieces of information:
Add these secrets in Fleet so they're available for server-side substitution in your scripts:
FLEET_SECRET_OP_CONNECT_HOST – Your Connect server endpointFLEET_SECRET_OP_CONNECT_TOKEN – API authentication tokenFLEET_SECRET_OP_VAULT_ID – Target vault for credentialsFLEET_SECRET_LAPS_ADMIN_USERNAME - Username created/rotated (default: laps-admin)Clone the laps-1password repository and copy the scripts into your Fleet GitOps repo's lib/ folder. Add the policy YAML files that check for recent password rotation.
Each policy uses a run_script automation that triggers the platform-specific LAPS script on any host that fails the 7-day check. When you push changes to your GitOps repo, Fleet picks them up automatically.
After deployment:
Automation reduces risk: No more shared passwords or manual rotation schedules. Devices handle it themselves on a fixed cadence.
Audit trail: Every password rotation creates a new vault entry with metadata (hostname, username, timestamp). You'll know exactly when credentials changed and which device they belong to.
Zero-trust retrieval: Credentials stay encrypted in 1Password until an admin with proper permissions retrieves them. Even if someone gains access to a device, they won't find plaintext passwords sitting around.
Platform flexibility: The same workflow supports both macOS and Windows. One policy, one set of scripts, consistent security posture.
The repository includes a complete test suite you can run locally with Docker Compose, along with manual testing checklists for both macOS and Windows.
If a rotation fails, check Fleet's script execution logs and verify the device can reach your Connect server. Firewall rules and network segmentation sometimes block API calls.
Once you've got LAPS running, consider:
Managing local admin passwords doesn't have to be painful. With Fleet handling the automation and 1Password securing the storage, you get enterprise-grade credential management without the enterprise-grade headaches.