@loginguards/loginguards-win
v2.0.0
Published
LoginGuards Active Directory Password Protection for Windows
Maintainers
Readme
LoginGuards Active Directory Password Protection (Windows)
Enterprise-grade password breach prevention for Windows domains.
Features
- Zero Trust password validation via LoginGuards API
- Windows Password Filter DLL for domain-wide enforcement on DCs
- Local Windows service policy engine (named pipe IPC)
- No password storage; passwords never logged
- Secure API key storage (Windows Credential Manager via keytar)
- CLI:
configure,install,test,uninstall,check,pipe-test
Install (development)
npm i -g @loginguards/loginguards-win
loginguards-win configure
loginguards-win install
loginguards-win test
loginguards-win --helpConfiguration
- API base:
https://api.loginguards.com/v1 - Required header:
x-api-key: <LOGIN_GUARDS_API_KEY> - Behavior on API failure is configurable:
fail-open(default) orfail-closed - Timeout default:
1500ms(configurable)
Security
- Never logs plaintext passwords
- API key stored in Windows Credential Manager
- HTTPS only
Active Directory Integration (V2)
V2 includes a signed x64 Windows Password Filter DLL that runs inside LSASS on Domain Controllers and communicates with the local policy engine via a named pipe (\\.\\pipe\\LoginGuardsPwdFilter). The service calls the LoginGuards API and returns an allow/deny decision to the DLL.
Decision mapping uses the API field breached and returns reasons: SAFE, COMPROMISED, API_DOWN, TIMEOUT, NO_API_KEY. Default policy is fail-open.
Deployment (Domain Controller only)
- Configure API connectivity on the DC:
loginguards-win configure - Install service and register the password filter (admin required; reboot recommended):
# A prebuilt DLL can be bundled at assets/LoginGuardsPwdFilter/x64/LoginGuardsPwdFilter.dll # Or provide an explicit path via --dllPath loginguards-win install \ --failMode open \ --timeoutMs 1500 \ --pipeName "\\.\\pipe\\LoginGuardsPwdFilter" \ --reboot - Reboot is required for the password filter to load into LSASS.
To uninstall on a DC:
loginguards-win uninstall --rebootTest and Diagnostics
Domain Controller mode:
loginguards-win test --mode dcValidates service, pipe, registry (Notification Packages), DLL presence, API reachability, and evaluates a non-destructive test password.
Client mode (domain-joined workstation):
loginguards-win test --mode clientShows domain membership and logon server; enforcement validation must be run on a DC.
Direct password check (no storage/logging):
loginguards-win check --prompt # or loginguards-win check --password "YourPassword" --debug
Recommended Rollout (Safety)
- Deploy to a secondary Domain Controller first
- Validate password resets/changes with test users
- Roll out to all Domain Controllers after validation
Uninstall
loginguards-win uninstall