Skip to main content

Password Interceptor for Active Directory

MyPass Cloud supports SSPR and password synchronization across multiple Microsoft Active Directories from a single tenant. To enable this, the Password Sync Interceptor captures password changes on domain controllers and securely forwards them to MyPass Cloud for synchronization with integrated systems.

The Interceptor installs a hook on domain controllers to capture all Password Reset and Password Change events. It must be installed on all domain controllers within the domain to function effectively.

๐Ÿ› ๏ธ Requirementsโ€‹

  • .NET Framework version 4.6.2 or higher
  • MSDTC (Microsoft Distributed Transaction Coordinator) enabled and running

๐Ÿ“ฆ Installation Steps (GUI)โ€‹

  1. Run the Interceptor installer.
  2. Accept the License Agreement and click Next.
  3. Enter User and Organization information, then click Next.
  4. In Destination Folder, click Change to select an install path (optional).
  5. For password sync target configuration:
    • Use the Server Name option for most environments.
    • If using SSL, install the trusted root certificate using MMC Snap-in.
  6. Click Install to start the installation.
  7. After installation completes, click Finish.

โš ๏ธ Important: A reboot of the domain controller is required for the Interceptor to activate.

๐Ÿงช Silent Installation (Command Line)โ€‹

To install silently via command line:

FastPass-PasswordInterceptor.msi /quiet SERVER=tenant-sync-fqdn
  • Replace tenant-sync-fqdn with the fully qualified domain name of your MyPass Cloud tenant.
  • After installation, a reboot is required.

Note: For advanced custom connection strings, use the GUI installer.

โš™๏ธ Registry-Based Filter Configurationโ€‹

Registry path:

HKEY_LOCAL_MACHINE\SOFTWARE\FastPassCorp\Password Interceptor

Create each value as a String Value. All patterns support .NET regex.

๐Ÿ” Account & Group Sync Filtersโ€‹

ValueDescription
AccountNamePatternAllowOnly forward users matching this account name pattern
AccountNamePatternDenyBlock users matching this account name pattern
GroupNamePatternAllowOnly forward users in matching groups (matches memberOf attribute)
GroupNamePatternDenyBlock users in matching groups

Deny filters take precedence over allow filters. If a user matches both, the sync is blocked.

๐Ÿ’ก Examplesโ€‹

GroupNamePatternAllow = "CN=myusers,OU=Groups,OU=somewhere,DC=Domain,DC=local"
GroupNamePatternAllow = "CN=myusers," # Match regardless of OU
GroupNamePatternDeny = "_admin" # Block any group containing "_admin"

๐Ÿ“‹ Custom Event Logging Filtersโ€‹

To enable Windows Event Log messages for filtered-out users, set these String Values to true:

Registry ValueLogs When...
EventLogGenerateEventForFailedPassingAccountNamePatternAllowA user fails the AccountNamePatternAllow check
EventLogGenerateEventForFailedPassingAccountNamePatternDenyA user is blocked by AccountNamePatternDeny
EventLogGenerateEventForFailedPassingGroupNamePatternAllowA user fails the GroupNamePatternAllow group membership check
EventLogGenerateEventForFailedPassingGroupNamePatternDenyA user is blocked by GroupNamePatternDeny

These logs help audit which password events were suppressed and why.