Skip to main content
Due to how Windows local account passwords are rotated, retired credentials will not be able to authenticate during their inactive period.This is a limitation of the rotation mechanism and cannot be rectified by Infisical.

Prerequisites

  • Windows Server with SMB3 support enabled
  • Create an SMB Connection with administrator credentials
  • Ensure your network security policies allow SMB connections from Infisical to this rotation provider
Run the following PowerShell command as Administrator on the Windows server to allow inbound SMB connections:
New-NetFirewallRule -DisplayName "Allow SMB Inbound" -Direction Inbound -Protocol TCP -LocalPort 445 -Action Allow
To verify the rule was created:
Get-NetFirewallRule -DisplayName "Allow SMB Inbound"

Create a Windows Local Account Rotation in Infisical

  1. Navigate to your Secret Manager Project’s Dashboard and select Add Secret Rotation from the actions dropdown. Secret Manager Dashboard
  2. Select the Windows Local Account option. Select Windows Local Account
  3. Select the SMB Connection to use and configure the rotation behavior. Then click Next. Rotation Configuration
    • SMB Connection - the connection that will perform the rotation of the configured user’s password.
    • Rotation Interval - the interval, in days, that once elapsed will trigger a rotation.
    • Rotate At - the local time of day when rotation should occur once the interval has elapsed.
    • Auto-Rotation Enabled - whether secrets should automatically be rotated once the rotation interval has elapsed. Disable this option to manually rotate secrets or pause secret rotation.
    Due to Windows Local Account Rotations rotating a single credential set, auto-rotation may result in service interruptions. If you need to ensure service continuity, we recommend disabling this option.
  4. Configure the required Parameters for your rotation. Then click Next. Rotation Parameters
  • Rotation Method - The method to use when rotating the target user’s password.
    • Login as Target - Infisical will use the target user’s current credentials to authenticate and rotate its own password. The target user must have administrator privileges on the Windows machine to be able to rotate its own password.
    • Login as Root - Infisical will use the administrator credentials provided in the SMB Connection to rotate the target user’s password.
  • Username - The target Windows username whose password will be rotated.
  • Current Password - The current password of the target user (required when Rotation Method is set to Login as Target).
  • Password Requirements - The constraints to apply when generating new passwords.
  1. Specify the secret names that the Windows credentials should be mapped to. Then click Next. Rotation Secrets Mapping
    • Username - the name of the secret that the Windows username will be stored in.
    • Password - the name of the secret that the rotated password will be stored in.
  2. Give your rotation a name and description (optional). Then click Next. Rotation Details
    • Name - the name of the secret rotation configuration. Must be slug-friendly.
    • Description (optional) - a description of this rotation configuration.
  3. Review your configuration, then click Create Secret Rotation. Rotation Review
  4. Your Windows Local Account credentials are now available for use via the mapped secrets. Rotation Created

Reconcile Windows Local Account

If you suspect the credentials are out of sync (for example, after a manual password change on the server), you can regain access by using Reconcile. This will use the configured Windows App Connection’s administrator account to reset the target user’s password and sync it with Infisical.Reconcile OptionReconcile Confirmation